LEADER 03263nam a2200397Ii 4500 001 991003254179707536 006 m d 007 cr cn||||||||| 008 070806s2002 enka s 001 0 eng d 020 $a9781928994701 020 $a1928994709 035 $ab13656090-39ule_inst 037 $a101100:101134$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a005.8$222 245 00$aHack proofing your network$h[electronic resource] /$c[contributors] David R. Mirza Ahmad ... [et al.] ; technical editor, Ryan Russell. 250 $a2nd ed. 260 $aRockland, Mass. :$a[Great Britain] :$bSyngress,$cc2002. 300 $axxxiv, 787 p. :$bill. ;$c24 cm. 500 $aPrevious ed.: 2000. 504 $aIncludes index. 520 $aA new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network. Updated coverage of an international bestseller and series flagship Covers more methods of attack and hacker secrets Interest in topic continues to grow - network architects, engineers and administrators continue to scramble for security books Written by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials A great addition to the bestselling "Hack Proofing..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at www.solutions@syngress.com. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer networks$xSecurity measures. 655 7$aElectronic books.$2local 700 1 $aAhmad, David R. Mirza.$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0739068 700 1 $aRussell, Ryan,$d1969- 776 1 $cOriginal$z1928994709$z9781928994701$w(OCoLC)48468640 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781928994701$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13656090$b24-02-22$c24-01-08 912 $a991003254179707536 994 $aC0$bTEF 996 $aHack proofing your network$91464015 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$genk$h0$i0