Imagen 1 de 1

Galería
Imagen 1 de 1

¿Quieres vender uno?
Computer Security & Penetration Testing by Wolf Halton & Alfred Basta
USD11,99
Aproximadamente10,23 EUR
Estado:
Nuevo
Libro nuevo, sin usar y sin leer, que está en perfecto estado; incluye todas las páginas sin defectos. Consulta el anuncio del vendedor para obtener más información.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Envío:
USD4,00 (aprox. 3,41 EUR) USPS Media MailTM.
Ubicado en: Chicago, Illinois, Estados Unidos
Entrega:
Entrega prevista entre el mié. 8 oct. y el jue. 16 oct. a 94104
Devoluciones:
14 días para devoluciones. El comprador paga el envío de la devolución..
Pagos:
Compra con confianza
El vendedor asume toda la responsabilidad de este anuncio.
N.º de artículo de eBay:363759036569
Características del artículo
- Estado
- ISBN
- 9781418048266
Acerca de este producto
Product Identifiers
Publisher
Delamr Cengage Learning
ISBN-10
1418048267
ISBN-13
9781418048266
eBay Product ID (ePID)
57277073
Product Key Features
Number of Pages
608 Pages
Publication Name
Computer Security and Penetration Testing
Language
English
Publication Year
2007
Subject
Security / General, General, Security / Networking
Type
Textbook
Subject Area
Computers
Format
Perfect
Dimensions
Item Height
1.2 in
Item Weight
28 Oz
Item Length
9 in
Item Width
7.3 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
2008-270481
Dewey Edition
23
Reviews
Chapter 1 - Ethics of Hacking and CrackingChapter 2 - ReconnaissanceChapter 3 - Scanning ToolsChapter 4 - SniffersChapter 5 - TCP/IP VulnerabilitiesChapter 6 - Techniques of Password CrackingChapter 7 - SpoofingChapter 8 - Session HijackingChapter 9 - Hacking Network DevicesChapter 10 - Trojan HorsesChapter 11 - Denial of Service AttacksChapter 12 - Buffer OverflowsChapter 13 - Programming Exploits Chapter 14 - Mail Vulnerabilities Chapter 15 - Web Application Vulnerabilities Chapter 16 - Windows VulnerabilitiesChapter 17 - Linux Vulnerabilities Chapter 18 - Incident HandlingAppendices (H1)A.1 Appendix 1A.2 Appendix 2: ASCII CodeA.3 Appendix 3 -IPv4 IP Packet StructureA.4 Appendix 4 -Hunt MenusA.5 Appendix 5 - Historic WindowsGlossaryReferences
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Chapter 1 - Ethics of Hacking and CrackingChapter 2 - ReconnaissanceChapter 3 - Scanning ToolsChapter 4 - SniffersChapter 5 - TCP/IP VulnerabilitiesChapter 6 - Techniques of Password CrackingChapter 7 - SpoofingChapter 8 - Session HijackingChapter 9 - Hacking Network DevicesChapter 10 - Trojan HorsesChapter 11 - Denial of Service AttacksChapter 12 - Buffer OverflowsChapter 13 - Programming Exploits Chapter 14 - Mail Vulnerabilities Chapter 15 - Web Application Vulnerabilities Chapter 16 - Windows VulnerabilitiesChapter 17 - Linux Vulnerabilities Chapter 18 - Incident HandlingAppendices (H1)A.1 Appendix 1A.2 Appendix 2: ASCII CodeA.3 Appendix 3 -IPv4 IP Packet StructureA.4 Appendix 4 -Hunt MenusA.5 Appendix 5 - Historic WindowsGlossaryReferences
Synopsis
This book is designed to give readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. With real-world examples that reflect today's most important and relevant security topics, Penetration Testing will address how and why people attack computers and networks, so that readers can be armed with the knowledge and techniques to successfully combat hackers. Because the world of information security changes so quickly and is often the subject of much hype, this book also aims to provide a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this valuable resource teaches the skills needed to go from hoping a system is secure to knowing that it is.
LC Classification Number
TK5105.59.B366 2008
Descripción del artículo del vendedor
Acerca de este vendedor
jen313-STORE
98,6% de votos positivos•11 mil artículos vendidos
Registrado como vendedor particularPor tanto, no se aplican los derechos de los consumidores derivados de las leyes de protección de los consumidores de la UE. La Garantía al cliente de eBay sigue aplicando a la mayoría de compras. Más informaciónMás información
Votos de vendedor (6.025)
- 0***r (72)- Votos emitidos por el comprador.Mes pasadoCompra verificadaProduct arrived in the exact same condition as advertised by the seller. The quality of the product was more than acceptable and appeared to be well worth the cost involved. The product was well packed and appeared to arrive undamaged. My order was promptly processed and quickly shipped by the seller. I would be happy to purchase from this dealer again, and/or recommend them to my family and friends.
- e***c (58)- Votos emitidos por el comprador.Últimos 6 mesesCompra verificadaPackaging was spot on and shipping was incredibly quick. My item was even better than described. Very pleased.
- 1***_ (43)- Votos emitidos por el comprador.Últimos 6 mesesCompra verificadaShipping was fast and nicely packed. Item as described and in great condition for an older product still in packaging. A+++ thank you!CN Cartoon Network Foster's Home of Imaginary Friends BLUE Cell Phone Charm NEW (#365581174029)