LEADER 01011nam a22002651i 4500 001 991002443459707536 005 20040316192422.0 008 040407s1960 sp |||||||||||||||||spa 035 $ab12923667-39ule_inst 035 $aARCHE-090327$9ExL 040 $aDip.to Scienze Storiche$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a910 100 1 $aAllix, André$0376434 245 10$aManual de geografia general :$bfisica, humana y economica /$cAndré Allix ; traduccion y adaptacion de José Manuel Casas Torres 250 $a3. ed. 260 $aMadrid :$bRialp,$c1960 300 $a1 v. ;$c25 cm 650 4$aGeografia$xManuali 700 1 $aCasas Torres, José Manuel 907 $a.b12923667$b02-04-14$c16-04-04 912 $a991002443459707536 945 $aLE009 GEOG.04-61$g1$i2009000164703$lle009$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i13496591$z16-04-04 996 $aManual de geografia general$9304611 997 $aUNISALENTO 998 $ale009$b16-04-04$cm$da $e-$fspa$gsp $h0$i1 LEADER 04818oam 2200493 450 001 9910815322503321 005 20190911100030.0 010 $a0-12-416695-4 035 $a(OCoLC)865474324 035 $a(MiFhGG)GVRL8DRO 035 $a(EXLCZ)992550000001113522 100 $a20140424d2014 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 00$aNetwork and system security /$fedited by John R. Vacca 205 $a2nd ed. 210 $aWaltham, Mass. $cAcademic Press$d2014 210 1$aWaltham, MA :$cSyngress,$d2014. 215 $a1 online resource (xxi, 406 pages) $cillustrations (some color) 225 0 $aGale eBooks 300 $aDescription based upon print version of record. 311 $a0-12-416689-X 311 $a1-299-82127-8 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Network and System Security; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Detecting System Intrusions; 1. Introduction; 2. Monitoring Key Files in the System; Files Integrity; 3. Security Objectives; There Is Something Very Wrong Here; Additional Accounts on the System; Timestamps; Hidden Files and Directories; 4. 0day Attacks; Attack Vectors; Vulnerability Window; Discovery; Protection; Ethics; 5. Good Known State; Monitoring Running Processes in the System; Files with Weird Names; 6. Rootkits 327 $aKernel-Level RootkitsUserland Rootkits; Rootkit Detection; 7. Low Hanging Fruit; 8. Antivirus Software; 9. Homegrown Intrusion Detection; 10. Full-Packet Capture Devices; Deployment; Centralized; Decentralized; Capacity; Features: Filtered versus Full-Packet Capture; Encrypted versus Unencrypted Storage; Sustained Capture Speed versus Peak Capture Speed; Permanent versus Overwritable Storage; Data Security; 11. Out-of-Band Attack Vectors; 12. Security Awareness Training; 13. Data Correlation; 14. SIEM; 15. Other Weird Stuff on the System; 16. Detection 327 $a17. Network-Based Detection of System Intrusions (DSIs)18. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; References; 2. Preventing System Intrusions; 1. So, What is an Intrusion?; 2. Sobering Numbers; 3. Know Your Enemy: Hackers versus Crackers; 4. Motives; 5. The Crackers' Tools of the Trade; Our "Unsecured" Wireless World; 6. Bots; 7. Symptoms of Intrusions; 8. What Can You Do?; Know Today's Network Needs; Network Security Best Practices 327 $a9. Security Policies10. Risk Analysis; Vulnerability Testing; Audits; Recovery; 11. Tools of Your Trade; Intrusion Detection Systems (IDSs); Firewalls; Intrusion Prevention Systems; Application Firewalls; Access Control Systems; Unified Threat Management; 12. Controlling User Access; Authentication, Authorization, and Accounting; What the User Knows; What the User Has; Tokens; Time Synchronous; Event Synchronous; Challenge-Response; The User is Authenticated, but is She/He Authorized?; Accounting; Keeping Current; 13. Intrusion Prevention Capabilities; 14. Summary 327 $aChapter Review Questions/ExercisesTrue/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 3. Guarding Against Network Intrusions; 1. Traditional Reconnaissance and Attacks; 2. Malicious Software; Lures and "Pull" Attacks; 3. Defense in Depth; 4. Preventive Measures; Access Control; Vulnerability Testing and Patching; Closing Ports; Firewalls; Antivirus and Antispyware Tools; Spam Filtering; Honeypots; Network Access Control; 5. Intrusion Monitoring and Detection; Host-Based Monitoring; Traffic Monitoring 327 $aSignature-Based Detection 330 $aNetwork and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more. < 606 $aComputer networks$xSecurity measures 615 0$aComputer networks$xSecurity measures. 676 $a005.8 702 $aVacca$b John R. 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910815322503321 996 $aNetwork and system security$92088039 997 $aUNINA