LEADER 01151nam--2200385---450- 001 990000852700203316 005 20051212162444.0 035 $a0085270 035 $aUSA010085270 035 $a(ALEPH)000085270USA01 035 $a0085270 100 $a20020108h----1995km-y0itay0103----ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aNuovo atlante Treccani$fcartografia del Touring club italiano 210 $aRoma$cIstituto della Enciclopedia italiana$h1995 215 $a2 v$d32 cm 327 1 $a1 : Cartografia. - 2 : Indici, appendice 410 $12001 676 $a911. 712 02$aTouring club italiano 801 0$aIT$bsalbc$gISBD 912 $a990000852700203316 951 $aIII.1. 3307/1(912 NUO)$b142441 LM$c912 951 $aIII.1. 3307/2(912 NUO)$b142442 LM$c912 959 $aBK 969 $aUMA 979 $aPATTY$b90$c20020108$lUSA01$h1334 979 $c20020403$lUSA01$h1730 979 $aPATRY$b90$c20040406$lUSA01$h1659 979 $aCOPAT1$b90$c20051212$lUSA01$h1622 979 $aCOPAT1$b90$c20051212$lUSA01$h1624 996 $aNuovo atlante Treccani$9627126 997 $aUNISA LEADER 01410nam2-2200433---450- 001 990001690370203316 005 20070719123130.0 035 $a000169037 035 $aUSA01000169037 035 $a(ALEPH)000169037USA01 035 $a000169037 100 $a20040524d1972----km-y0itay0103----ba 101 $ager 102 $aLI 105 $a||||||||001yy 200 1 $a<> : Familie$fvon K. Jaberg und J. Jud$gdie Mundartaufnahmen wurden durchgefuhrt von P. Scheuermeier, G. Rohlfs und M. L. Wagner 210 $aNendeln$cKraus reprint$d1972 215 $a1 cartella (86 c. di tav. sciolte)$d61 cm 410 0$12001 454 1$12001 461 1$1001000169027$12001$aSprach-und Sachatlas Italiens und der Sudschweiz 606 0 $aItalia$xAtlanti linguistici 606 0 $aSvizzera meridionale$xAtlanti linguistici 700 1$aJABERG,$bKarl$0191935 701 1$aJUD,$bJakob$0185244 702 1$aROHLFS,$bGerhard 702 1$aWAGNER,$bMax Leopold 702 1$bSCHEUERMEIER,$aP. 801 0$aIT$bsalbc$gISBD 912 $a990001690370203316 951 $aIV.2. 87/1(XII B 17/1 I)$b57879 L.M.$cXII B 959 $aBK 969 $aUMA 979 $aSIAV5$b10$c20040524$lUSA01$h1054 979 $aSIAV5$b10$c20040524$lUSA01$h1101 979 $aSIAV5$b10$c20040524$lUSA01$h1336 979 $aCOPAT6$b90$c20070719$lUSA01$h1231 996 $aFamilie$9948966 997 $aUNISA LEADER 03769nam 2200673Ia 450 001 9910456406203321 005 20200520144314.0 010 $a1-282-68350-0 010 $a9786612683503 010 $a0-470-64286-6 035 $a(CKB)2550000000013627 035 $a(EBL)516952 035 $a(OCoLC)635955021 035 $a(SSID)ssj0000404185 035 $a(PQKBManifestationID)11278728 035 $a(PQKBTitleCode)TC0000404185 035 $a(PQKBWorkID)10341131 035 $a(PQKB)10763189 035 $a(MiAaPQ)EBC516952 035 $a(CaSebORM)9780470525203 035 $a(Au-PeEL)EBL516952 035 $a(CaPaEBR)ebr10383604 035 $a(CaONFJC)MIL268350 035 $a(EXLCZ)992550000000013627 100 $a20100202d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCEH$b[electronic resource] $ecertified ethical hacker study guide /$fKimberly Graves 205 $a1st ed. 210 $aIndianapolis, IN $cWiley$d2010 215 $a1 online resource (439 p.) 300 $aDescription based upon print version of record. 311 $a0-470-52520-7 320 $aIncludes bibliographical references and index. 327 $aCEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms 327 $aChapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary 327 $aIndex 330 $aFull Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial 606 $aElectronic data processing personnel$xCertification 606 $aComputer security$xExaminations$vStudy guides 606 $aComputer hackers$xExaminations$vStudy guides 606 $aComputer networks$xExaminations$vStudy guides 608 $aElectronic books. 615 0$aElectronic data processing personnel$xCertification. 615 0$aComputer security$xExaminations 615 0$aComputer hackers$xExaminations 615 0$aComputer networks$xExaminations 676 $a005.8 700 $aGraves$b Kimberly$f1974-$01036506 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910456406203321 996 $aCEH$92456899 997 $aUNINA