Hacking exposed: network security secrets & solutions
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Berkeley [u.a.]
Osborne/McGraw-Hill
2001
|
Ausgabe: | 2. ed. |
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014828763&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Beschreibung: | Frühere und spätere Aufl. u.d.T.: McClure, Stuart: Hacking exposed |
Umfang: | XXIX, 703 S. Ill., graph. Darst. |
ISBN: | 0072127481 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV021613594 | ||
003 | DE-604 | ||
005 | 20060620 | ||
007 | t| | ||
008 | 060609s2001 xx ad|| |||| 00||| eng d | ||
020 | |a 0072127481 |9 0-07-212748-1 | ||
035 | |a (OCoLC)247886115 | ||
035 | |a (DE-599)BVBBV021613594 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-29T |a DE-634 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 250f |2 stub | ||
100 | 1 | |a Scambray, Joel |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hacking exposed |b network security secrets & solutions |c Joel Scambray ; Stuart McClure ; George Kurtz |
250 | |a 2. ed. | ||
264 | 1 | |a Berkeley [u.a.] |b Osborne/McGraw-Hill |c 2001 | |
300 | |a XXIX, 703 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Frühere und spätere Aufl. u.d.T.: McClure, Stuart: Hacking exposed | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betriebssystem |0 (DE-588)4006216-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Betriebssystem |0 (DE-588)4006216-8 |D s |
689 | 1 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 2 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
689 | 3 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | |8 3\p |5 DE-604 | |
689 | 4 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 4 | |8 4\p |5 DE-604 | |
700 | 1 | |a McClure, Stuart |e Verfasser |0 (DE-588)121792064 |4 aut | |
700 | 1 | |a Kurtz, George |e Verfasser |4 aut | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014828763&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-014828763 |
Datensatz im Suchindex
_version_ | 1819327697919148032 |
---|---|
adam_text | Titel: Hacking exposed
Autor: Scambray, Joel
Jahr: 2001
CONTENTS
Foreword..................................................................xvii
Acknowledgments ......................................................xxi
Introduction................................................................xxiii
sum
Casing the Establishment
Case Study: Target Acquisition ........................................2
? 1 Footprinting....................................................................5
What Is Footprinting? ..................................................6
Why Is Footprinting Necessary? ................................6
Internet Footprinting....................................................6
Step 1. Determine the Scope of Your Activities................8
Step 2. Network Enumeration....................................13
Step 3. DNS Interrogation........................................22
Step 4. Network Reconnaissance ................................27
Summary..................................................................31
ix
X Hacking Exposed: Network Security Secrets and Solutions
? 2 Scanning ......................................................................33
Scan Types..........................................................^
Identifying TCP and UDP Services Running ..................46
Windows-Based Port Scanners ..................................51
Port Scanning Breakdown........................................57
Active Stack Fingerprinting......................................61
Passive Stack Fingerprinting ....................................65
The Whole Enchilada: Automated Discovery Tools..................67
Summary..................................................................68
? 3 Enumeration ..................................................................71
Windows NT/2000 Enumeration......................................72
NT/2000 Network Resource Enumeration ....................76
NT/2000 User and Group Enumeration........................87
NT/2000 Applications and Banner Enumeration..............95
Let Your Scripts Do the Walking ................................99
Novell Enumeration ....................................................^00
Browsing the Network Neighborhood..........................100
UNIX Enumeration......................................................106
Summary..................................................................113
System Hacking
Case Study: Know Your Enemy........................................116
? 4 Hacking Windows 95/98 and ME..............................................117
Win 9x Remote Exploits ................................................118
Direct Connection to Win 9x Shared Resources................119
Win 9x Backdoor Servers and Trojans ..........................124
Known Server Application Vulnerabilities ....................129
Win 9x Denial of Service..........................................130
Win 9x Local Exploits....................................................130
Windows Millennium Edition (ME) ..................................137
Summary..................................................................138
? 5 Hacking Windows NT........................................................141
Overview..........................................243
Where We re Headed ............................................143
What About Windows 2000? ....................................143
Contents
XI
The Quest for Administrator............................................144
Remote Exploits: Denial of Service and Buffer Overflows . . 160
Privilege Escalation................................................164
Consolidation of Power ................................................174
Exploiting Trust....................................................185
Sniffers..............................................................190
Remote Control and Back Doors ................................194
Port Redirection....................................................203
General Countermeasures to Privileged Compromise .... 207
Rootkit: The Ultimate Compromise....................................211
Covering Tracks..........................................................214
Disabling Auditing................................................214
Clearing the Event Log............................................214
Hiding Files........................................................215
Summary..................................................................216
T 6 Hacking Windows 2000 ........................................................219
Footprinting..............................................................221
Scanning..................................................................221
Enumeration..............................................................226
Penetration................................................................229
NetBIOS-SMB Password Guessing..............................229
Eavesdropping on Password Hashes............................229
Attacks Against IIS 5..............................................229
Remote Buffer Overflows ........................................233
Denial of Service ........................................................233
Privilege Escalation......................................................238
Pilfering ............................................................241
Grabbing the Win 2000 Password Hashes......................241
The Encrypting File System (EFS)................................246
Exploiting Trust....................................................249
Covering Tracks..........................................................251
Disabling Auditing................................................251
Clearing the Event Log............................................252
Hiding Files........................................................252
Back Doors................................................................252
Startup Manipulation ............................................252
Remote Control....................................................255
Keystroke Loggers ................................................257
General Countermeasures: New Windows Security Tools..........257
Group Policy ......................................................257
runas................................................................260
Summary..................................................................261
xii
Hacking Exposed: Network Security Secrets and Solutions
? 7 Novell NetWare Hacking ......................................................265
Attaching but Not Touching............................................267
Enumerate Bindery and Trees..........................................268
Opening the Unlocked Doors ..........................................275
Authenticated Enumeration............................................277
Gaining Admin ..........................................................282
Application Vulnerabilities ............................................285
Spoofing Attacks (Pandora) ............................................287
Once You Have Admin on a Server...............................290
Owning the NDS Files ..................................................292
Log Doctoring............................................................29®
Console Logs ......................................................299
Further Resources........................................................302
Web Sites
(ftp://ftp.novell.com/pub/updates/nw/nw411/) .... 302
Usenet Groups ....................................................303
Summary..................................................................303
? 8 Hacking UNIX...........7 .........................................305
The Quest for Root ......................................................306
A Brief Review ....................................................306
Vulnerability Mapping............................................307
Remote Access Versus Local Access ..................................307
Remote Access............................................................308
Data Driven Attacks ..............................................312
I Want My Shell....................................................317
Common Types of Remote Attacks..............................322
Local Access..............................................................339
After Hacking Root......................................................357
Trojans..............................................................358
Rootkit Recovery..................................................369
Summary..................................................................370
mm
Network Hacking
Case Study: Sweat the Small Stuff! ....................................374
? 9 Dial-Up, PBX, Voicemail, and VPN Hacking ..................................377
Wardialing..............................^80
Hardware ..............................ggg
Legal Issues ............................001
Peripheral Costs...........................................,0-
Contents
Software............................................................382
A Final Note........................................................403
PBX Hacking..............................................................405
Virtual Private Network (VPN) Hacking..............................415
Summary..................................................................419
? 10 Network Devices ..............................................................421
Discovery ................................................................422
Detection............................................................422
SNMP ..............................................................429
Back Doors................................................................433
Default Accounts..................................................433
Lower the Gates (Vulnerabilities)................................437
Shared Versus Switched ................................................443
Detecting the Media You re On..................................444
Passwords on a Silver Platter: Dsniff............................445
Sniffing on a Network Switch....................................448
snmpsniff ..........................................................452
Summary..................................................................457
? 11 Firewalls ......................................................................459
Firewall Landscape......................................................460
Firewall Identification ..................................................460
Advanced Firewall Discovery....................................465
Scanning Through Firewalls............................................469
Packet Filtering ..........................................................473
Application Proxy Vulnerabilities......................................477
WinGate Vulnerabilities..........................................479
Summary..................................................................481
? 12 Denial of Service (DoS) Attacks ..............................................483
Motivation of DoS Attackers............................................484
Types of DoS Attacks....................................................485
Bandwidth Consumption ........................................485
Resource Starvation ..............................................486
Programming Flaws ..............................................486
Routing and DNS Attacks........................................487
Generic DoS Attacks ....................................................488
Sites Under Attack ................................................491
UNIX and Windows NT DoS ..........................................494
Remote DoS Attacks ..............................................495
Distributed Denial of Service Attacks ..........................499
Local DoS Attacks ................................................504
Summary..................................................................506
XiV Hacking Exposed: Network Security Secrets and Solutions
Software Hacking
Case Study: Using All the Dirty Tricks to Get In ....................508
? 13 Remote Control Insecurities ..................................................511
Discovering Remote Control Software................................512
Connecting................................................................513
Weaknesses ..............................................................514
Revealed Passwords ..............................................516
Uploading Profiles ................................................517
What Software Package Is the Best in Terms of Security? ..........521
pcAnywhere........................................................521
ReachOut ..........................................................521
Remotely Anywhere..............................................521
Remotely Possible/ControlIT....................................523
Timbuktu ..........................................................523
Virtual Network Computing (VNC) ............................523
Citrix................................................................526
Summary..................................................................527
? 14 Advanced Techniques ........................................................529
Session Hijacking........................................................530
Back Doors................................................................533
Trojans ....................................................................555
Subverting the System Environment: Rootkits and
Imaging Tools ........................................................558
Social Engineering ......................................................561
Summary..................................................................563
? 15 Web Hacking ..................................................................565
Web Pilfering ............................................................566
Finding Weil-Known Vulnerabilities..................................570
Automated Scripts, for All Those Script Kiddies ............570
Automated Applications..........................................572
Script Inadequacies: Input Validation Attacks........................573
Active Server Pages (ASP) Vulnerabilities......................582
Buffer Overflows ..........................................con
Poor Web Design ... ....................KQQ
c 0 ..............................................jVo
..................................................................600
Contents
T 16 Hacking the Internet User......................................................601
Malicious Mobile Code..........................................603
Microsoft ActiveX ................................................603
Java Security Holes................................................614
Beware the Cookie Monster......................................618
Internet Explorer HTML Frame Vulnerabilities................621
SSL Fraud ................................................................623
Email Hacking............................................................626
Mail Hacking 101.........................................626
Executing Arbitrary Code Through Email......................629
Outlook Address Book Worms ..................................637
File Attachment Attacks...........................639
IRC Hacking..............................................................647
Napster Hacking with Wrapster ......................................649
Global Countermeasures to Internet User Hacking..................650
Keep Antivirus Signatures Updated ............................650
Guarding the Gateways ..........................................651
Summary..................................................................652
Appendixes
TA Ports ..........................................................................657
TB Top 14 Security Vulnerabilities ................................................661
? C About the Companion Web Site ..............................................663
Novell ....................................................................664
UNIX......................................................................665
Windows NT ............................................................665
Wordlists and Dictionaries..............................................666
Wardialing................................................................666
Enumeration Scripts ....................................................666
T Index ..........................................................................667
|
any_adam_object | 1 |
author | Scambray, Joel McClure, Stuart Kurtz, George |
author_GND | (DE-588)121792064 |
author_facet | Scambray, Joel McClure, Stuart Kurtz, George |
author_role | aut aut aut |
author_sort | Scambray, Joel |
author_variant | j s js s m sm g k gk |
building | Verbundindex |
bvnumber | BV021613594 |
classification_rvk | ST 200 |
classification_tum | DAT 050f DAT 460f DAT 250f |
ctrlnum | (OCoLC)247886115 (DE-599)BVBBV021613594 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02739nam a2200661 c 4500</leader><controlfield tag="001">BV021613594</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060620 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">060609s2001 xx ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0072127481</subfield><subfield code="9">0-07-212748-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)247886115</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021613594</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 250f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Scambray, Joel</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking exposed</subfield><subfield code="b">network security secrets & solutions</subfield><subfield code="c">Joel Scambray ; Stuart McClure ; George Kurtz</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley [u.a.]</subfield><subfield code="b">Osborne/McGraw-Hill</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIX, 703 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Frühere und spätere Aufl. u.d.T.: McClure, Stuart: Hacking exposed</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McClure, Stuart</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)121792064</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kurtz, George</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014828763&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014828763</subfield></datafield></record></collection> |
id | DE-604.BV021613594 |
illustrated | Illustrated |
indexdate | 2024-12-20T12:37:42Z |
institution | BVB |
isbn | 0072127481 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014828763 |
oclc_num | 247886115 |
open_access_boolean | |
owner | DE-29T DE-634 |
owner_facet | DE-29T DE-634 |
physical | XXIX, 703 S. Ill., graph. Darst. |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Osborne/McGraw-Hill |
record_format | marc |
spellingShingle | Scambray, Joel McClure, Stuart Kurtz, George Hacking exposed network security secrets & solutions Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Betriebssystem (DE-588)4006216-8 gnd Hacker (DE-588)4113821-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 (DE-588)4006216-8 (DE-588)4113821-1 (DE-588)4293034-0 (DE-588)4011144-1 (DE-588)4308416-3 |
title | Hacking exposed network security secrets & solutions |
title_auth | Hacking exposed network security secrets & solutions |
title_exact_search | Hacking exposed network security secrets & solutions |
title_full | Hacking exposed network security secrets & solutions Joel Scambray ; Stuart McClure ; George Kurtz |
title_fullStr | Hacking exposed network security secrets & solutions Joel Scambray ; Stuart McClure ; George Kurtz |
title_full_unstemmed | Hacking exposed network security secrets & solutions Joel Scambray ; Stuart McClure ; George Kurtz |
title_short | Hacking exposed |
title_sort | hacking exposed network security secrets solutions |
title_sub | network security secrets & solutions |
topic | Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Betriebssystem (DE-588)4006216-8 gnd Hacker (DE-588)4113821-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | Computersicherheit Rechnernetz Betriebssystem Hacker Zugriffskontrolle Datensicherung Internet |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014828763&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT scambrayjoel hackingexposednetworksecuritysecretssolutions AT mcclurestuart hackingexposednetworksecuritysecretssolutions AT kurtzgeorge hackingexposednetworksecuritysecretssolutions |