02686nam 2200469 450 991079600920332120200123125241.02-39009-084-2(CKB)3790000000018954(EBL)2088145(MiAaPQ)EBC2088145(Au-PeEL)EBL2088145(OCoLC)914149407(PPN)260365823(EXLCZ)99379000000001895420200123d2015 uy 0freur|n|---|||||txtrdacontentcrdamediacrrdacarrierSous-Mariniers des commandants anglais et allemand racontent leurs combats /Alastair Mars, Heinz SchaefferBruxelles ;Paris :Éditions Jourdan,[2015]1 online resource (376 p.)Carnets de guerre, 39-45Description based upon print version of record.2-87466-220-8 Couverture; Page de titre; PROLOGUE : NAISSANCE D'UN SOUS-MARIN; CHAPITRE I; CHAPITRE II; CHAPITRE III; CHAPITRE IV; CHAPITRE V; CHAPITRE VI; CHAPITRE VII; CHAPITRE VIII; CHAPITRE IX; CHAPITRE X; CHAPITRE XI; EPILOGUE; U - 977 : L'ODYSSÉE D'UN SOUS-MARIN ALLEMAND; CHAPITRE I : DES VOILES BLANCHES AUX LOUPS GRIS; CHAPITRE II : LA MORSURE DU LOUP; CHAPITRE III : A L'ATTAQUE D'UN CONVOI; CHAPITRE IV : CHANGEMENT DE DECOR; CHAPITRE V : TEMPETE ET COMBAT; CHAPITRE VI : DANS L'ENFER DE GIBRALTAR; CHAPITRE VII : ATTAQUE AERIENNE; CHAPITRE VIII; CHAPITRE IX : DERNIERE HEURE : ORDRE DE PRENDRE LA MERCHAPITRE X : SOIXANTE-SIX JOURS SOUS L'EAUCHAPITRE XI : SOUS LA CROIX DU SUD; CHAPITRE XII; Copyright PROMOTION DU MOIS : téléchargez ce livre à -50% jusqu'au 03/08 ! Qui étaient les officiers de la marine au cours de la Seconde guerre mondiale ?L'Anglais Alastair Mars et son « Unbroken » coula plus de 30 000 tonnes de navires ennemis, prit part à des opérations secrètes, survécut à quelques 400 mines sous-marines, sans compter les innombrables attaques d'avions et de bateaux, attaqua seul douze navires de guerre et détruisit deux croiseurs lourds. L'Allemand Schaeffer nous raconte son U-977 et l'incroyable odyssée qui le mena des côtes de Norvège à l'Argentine en échappant aux flottes alliée39-45, carnets de guerre.GermanyHistory, Military943Mars Alastair1915-490448Schaeffer H(Heinz),MiAaPQMiAaPQMiAaPQBOOK9910796009203321Sous-Mariniers3866714UNINA05389nam 2200685 450 991082037280332120230912131720.01-118-98713-61-119-18343-X1-118-98715-2(CKB)3710000000461409(EBL)1895190(SSID)ssj0001599450(PQKBManifestationID)16306052(PQKBTitleCode)TC0001599450(PQKBWorkID)14892303(PQKB)11025105(Au-PeEL)EBL4040350(CaPaEBR)ebr11090297(CaONFJC)MIL822790(OCoLC)918135837(Au-PeEL)EBL1895190(CaSebORM)9781118987056(MiAaPQ)EBC4040350(MiAaPQ)EBC1895190(PPN)194524558(EXLCZ)99371000000046140920150822h20152015 uy 0engur|n|---|||||txtccrThe network security test lab a step-by-step guide /Michael Gregg1st editionIndianapolis, Indiana :Wiley,2015.©20151 online resource (482 p.)Includes index.1-118-98705-5 The Network Security Test Lab; About the Author; Credits; Acknowledgments; Contents; Introduction; Chapter 1 Building a Hardware and Software Test Platform; Why Build a Lab?; Hardware Requirements; Physical Hardware; Equipment You Already Have; New Equipment Purchases; Used Equipment Purchases; Online Auctions; Thrift Stores; Company Sales; Virtual Hardware; VMware; VirtualBox; Hacker Hardware; Software Requirements; Operating Systems; Microsoft Windows; Linux; Navigating in Linux; Linux Basics; Mac OS X; Software and Applications; Learning Applications; Hacking Software; Summary; Key TermsExercisesEquipment Checklist; Installing VMware Workstation; Exploring Linux Operating System Options; Using VMware to Build a Windows Image; Using VMware Converter to Create a Virtual Machine; Exploring Other Operating System Options; Running Kali from VMware; Installing Tools on Your Windows Virtual Machine; Chapter 2 Passive Information Gathering; Starting at the Source; Scrutinizing Key Employees; Dumpster Diving (Electronic); Analyzing Web Page Coding; Exploiting Website Authentication Methods; Mining Job Ads and Analyzing Financial Data; Using Google to Mine Sensitive InformationExploring Domain OwnershipWHOIS; Regional Internet Registries; Domain Name System; Identifying Web Server Software; Web Server Location; Summary; Key Terms; Exercises; IP Address and Domain Identification; Information Gathering; Google Hacking; Banner Grabbing; Telnet; Netcat; VisualRoute; Chapter 3 Analyzing Network Traffic; Why Packet Analysis Is Important; How to Capture Network Traffic; Promiscuous Mode; Hubs and Switches; Hubbing Out and Using Taps; Switches; Capturing Network Traffic; Managed and Unmanaged Switches; ARP Cache Poisoning; Flooding; DHCP RedirectionRedirection and Interception with ICMPPreventing Packet Capture; Dynamic Address Inspection; DHCP Snooping; Preventing VLAN Hopping; Detecting Packet Capture; Wireshark; Wireshark Basics; Filtering and Decoding Traffic; Basic Data Capture-A Layer-by-Layer Review; Physical-Data-Link Layer; Network-Internet Layer; Transport-Host-Host Layer; Application Layer; Other Network Analysis Tools; Summary; Key Terms; Exercises; Fun with Packets; Packet Analysis with tcpdump; Packet Filters; Making a One-Way Data Cable; Chapter 4 Detecting Live Systems and Analyzing Results; TCP/IP BasicsThe Network Access LayerThe Internet Layer; The Host-to-Host Layer; Transmission Control Protocol; User Datagram Protocol; The Application Layer; Detecting Live Systems with ICMP; ICMP-Ping; Traceroute; Port Scanning; TCP and UDP Port Scanning; Advanced Port-Scanning Techniques; Idle Scan; Analyzing Port Scans; Port-Scanning Tools; Nmap; SuperScan; Other Scanning Tools; OS Fingerprinting; Passive Fingerprinting; Active Fingerprinting; How Nmap OS Fingerprinting Works; Scanning Countermeasures; Summary; Key Terms; Exercises; Understanding Wireshark; Interpreting TCP FlagsPerforming an ICMP Packet DecodeThe ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and hComputer networksSecurity measuresComputer securityEvaluationComputer networksSecurity measures.Computer securityEvaluation.005.8Gregg Michael884346MiAaPQMiAaPQMiAaPQBOOK9910820372803321The network security test lab3972957UNINA01150oas 2200421 a 450 991013458400332120251105213014.0(DE-599)ZDB2239978-1(OCoLC)406414108(CONSER) 2011223260(CKB)110992357286402(EXLCZ)9911099235728640220090623b19641969 uy gerurmnu||||||||txtrdacontentcrdamediacrrdacarrierProgrammiertes Lernen und programmierter UnterrichtBerlin F. Cornelsen1964-19690174-9811 Programmed instructionPeriodicalsProgrammed instructionfast(OCoLC)fst01078691Periodicals.fastProgrammed instructionProgrammed instruction.RCERCEOCLCQCLUUKMGBOCLCQOCLCFOCLCQJOURNAL9910134584003321Programmiertes Lernen und programmierter Unterricht2242735UNINA