LEADER 01043nam0-2200337---450- 001 990009359530403321 005 20110513094158.0 010 $a978-88-453-1638-8 035 $a000935953 035 $aFED01000935953 035 $a(Aleph)000935953FED01 035 $a000935953 100 $a20110513d2010----km-y0itay50------ba 101 1 $aita$ceng 105 $a--------001yy 200 1 $aMacrowikinomics$eriavviare il sistema$edal business al mondo$fDon Tapscott, Anthony D. Williams 210 $aMilano$cEtas$d2010 215 $aVII, 462 p.$d23 cm 225 1 $aEconomia e storia economica 454 0$12001$aMacrowikinomics$erebooting business and world$916756 610 0 $aImprese$ainnovazione tecnologica 676 $a303.4833 700 1$aTapscott,$bDon$f<1947->$089562 701 1$aWilliams,$bAnthony D.$f<1974- >$0309196 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990009359530403321 952 $aAZOA15A$b19639$fDECBC 959 $aDECBC 996 $aMacrowikinomics$916756 997 $aUNINA LEADER 01089nam2 2200289 i 450 001 USM1291915 005 20231121125915.0 010 $a8842445630 020 $aIT$b2003-2603D 100 $a20130408d2003 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $a˜3: œDal gotico internazionale alla maniera moderna$fGiulio Bora ... °et al.! 210 $a°Milano!$cElecta/B. Mondadori$d°2003! 215 $a400 p.$cill.$d30 cm. 461 1$1001CFI0548991$12001 $a˜I œluoghi dell'arte$estoria, opere, percorsi$fGiulio Bora ... °et al.!$v3 702 1$aBora$b, Giulio$3CFIV010842 801 3$aIT$bIT-01$c20130408 850 $aIT-FR0017 899 $aBiblioteca umanistica Giorgio Aprea$bFR0017 912 $aUSM1291915 950 2$aBiblioteca umanistica Giorgio Aprea$d 52MAG 4/49.3$e 52SBA0000056985 VMN RS Manuale d'esame$fC $h20130408$i20130408 977 $a 52 996 $aDal Gotico internazionale alla Maniera Moderna$91187091 997 $aUNICAS LEADER 05577nam 2200697Ia 450 001 9910784790303321 005 20230721030550.0 010 $a1-280-97384-6 010 $a9786610973842 010 $a0-470-23138-6 035 $a(CKB)1000000000400391 035 $a(EBL)315200 035 $a(OCoLC)630529467 035 $a(SSID)ssj0000291085 035 $a(PQKBManifestationID)11230502 035 $a(PQKBTitleCode)TC0000291085 035 $a(PQKBWorkID)10248466 035 $a(PQKB)10050803 035 $a(MiAaPQ)EBC315200 035 $a(Au-PeEL)EBL315200 035 $a(CaPaEBR)ebr10296353 035 $a(CaONFJC)MIL97384 035 $a(EXLCZ)991000000000400391 100 $a20070813d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe CEH prep guide$b[electronic resource] $ethe comprehensive guide to certified ethical hacking /$fRonald L. Krutz, Russell Dean Vines 210 $aIndianapolis, IN $cWiley$dc2007 215 $a1 online resource (770 p.) 300 $aIncludes index. 311 $a0-470-13592-1 327 $aThe CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions 327 $aChapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions 327 $aChapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking 327 $aAssessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions 327 $aPart IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security 327 $aDisk Encryption 330 $aThe Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scopePresents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and moreDiscusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hackingContains a CD-ROM that enables read 606 $aComputer security$xTesting$xExaminations$vStudy guides 606 $aComputer networks$xSecurity measures$xExaminations$vStudy guides 606 $aComputer networks$xExaminations$vStudy guides 606 $aComputer hackers 615 0$aComputer security$xTesting$xExaminations 615 0$aComputer networks$xSecurity measures$xExaminations 615 0$aComputer networks$xExaminations 615 0$aComputer hackers. 676 $a004.16 676 $a005.8 686 $a54.89$2bcl 700 $aKrutz$b Ronald L.$f1938-$0543581 701 $aVines$b Russell Dean$f1952-$01114690 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784790303321 996 $aThe CEH prep guide$93725134 997 $aUNINA