MARC 닫기
05589cam a2200685Ki 4500
000000532054
20210114162921
m d
cr cnu|||unuuu
180825s2020 mau ob 001 0 eng d
▼a 1048896051
▼a 1049600457
▼a 1049908864
▼a 1051125843
▼a 9781284147810
▼q (electronic bk.)
▼a 1284147819
▼q (electronic bk.)
▼z 1284147800
▼z 9781284147803
▼a 1874525
▼b (N$T)
▼a (OCoLC)1049912743
▼z (OCoLC)1048896051
▼z (OCoLC)1049600457
▼z (OCoLC)1049908864
▼z (OCoLC)1051125843
▼a EBLCP
▼b eng
▼c EBLCP
▼d YDX
▼d N$T
▼d 248023
▼a TK5105.59
▼a COM
▼x 060040
▼2 bisacsh
▼a COM
▼x 043050
▼2 bisacsh
▼a COM
▼x 053000
▼2 bisacsh
▼a 005.8
▼2 23
▼a Oriyano, Sean-Philip.
▼a Hacker techniques, tools, and incident handling
▼h [electronic resource] /:
▼c Sean-Philip Oriyano, Michael G. Solomon.
▼a Third edition.
▼a Burlington, MA:
▼b Jones & Bartlett Learning,
▼c [2020].
▼a 1 online resource (886 p.).
▼a text
▼b txt
▼2 rdacontent
▼a computer
▼b c
▼2 rdamedia
▼a online resource
▼b cr
▼2 rdacarrier
▼a Information systems security & assurance series
▼a Controlling Access
▼a Includes bibliographical references and index.
▼a Cover; Title Page; Copyright Page; Contents; Preface; Acknowledgments; About the Authors; CHAPTER 1 Hacking: The Next Generation; Profiles and Motives of Different Types of Hackers; Controls; The Hacker Mindset; Motivation; A Look at the History of Computer Hacking; Ethical Hacking and Penetration Testing; The Role of Ethical Hacking; Ethical Hackers and the C-I-A Triad; Common Hacking Methodologies; Performing a Penetration Test; The Role of the Law and Ethical Standards; CHAPTER 2 TCP/IP Review; Exploring the OSI Reference Model; The Role of Protocols; Layer 1: Physical Layer
▼a Layer 2: Data Link LayerLayer 3: Network Layer; Layer 4: Transport Layer; Layer 5: Session Layer; Layer 6: Presentation Layer; Layer 7: Application Layer; Mapping the OSI Model to Functions and Protocols; TCP/IP: A Layer-by-Layer Review; Physical or Network Access Layer; Network or Internet Layer; Host-to-Host Layer; Application Layer; CHAPTER 3 Cryptographic Concepts; Cryptographic Basics; Authentication; Integrity; Nonrepudiation; Symmetric and Asymmetric Cryptography; Cryptographic History; What Is an Algorithm or Cipher?; Symmetric Encryption; Asymmetric Encryption; Digital Signatures
▼a Purpose of Public Key InfrastructureThe Role of Certificate Authorities (CAs); PKI Attacks; Hashing; Common Cryptographic Systems; Cryptanalysis; Future Forms of Cryptography; CHAPTER 4 Physical Security; Basic Equipment Controls; Hard Drive and Mobile Device Encryption; Fax Machines and Printers; Voice over IP (VoIP); Physical Area Controls; Fences; Perimeter Intrusion Detection and Assessment System (PIDAS); Gates; Bollards; Facility Controls; Doors, Mantraps, and Turnstiles; Walls, Ceilings, and Floors; Windows; Guards and Dogs; Construction; Personal Safety Controls; Lighting
▼a Alarms and Intrusion DetectionClosed-Circuit TV (CCTV)/Remote Monitoring; Physical Access Controls; Locks; Lock Picking; Tokens and Biometrics; Avoiding Common Threats to Physical Security; Natural, Human, and Technical Threats; Physical Keystroke Loggers and Sniffers; Wireless Interception and Rogue Access Points; Defense in Depth; CHAPTER 5 Footprinting Tools and Techniques; The Information-Gathering Process; The Information on a Company Website; Discovering Financial Information; Google Hacking; Exploring Domain Information Leakage; Manual Registrar Query; Automatic Registrar Query; Whois
▼a NslookupInternet Assigned Numbers Authority (IANA); Determining a Network Range; Tracking an Organization's Employees; Exploiting Insecure Applications; Using Social Networks; Using Basic Countermeasures; CHAPTER 6 Port Scanning; Determining the Network Range; Identifying Active Machines; Wardialing; Wardriving and Related Activities; Pinging; Port Scanning; Mapping Open Ports; Nmap; SuperScan; Scanrand; THC-Amap; OS Fingerprinting; Active OS Fingerprinting; Passive OS Fingerprinting; Mapping the Network; Analyzing the Results; CHAPTER 7 Enumeration and Computer System Hacking; Windows Basics
▼a Description based upon print version of record.
▼a Master record variable field(s) change: 050, 072, 082, 650
▼a Computer security.
▼a Penetration testing (Computer security)
▼a Computer networks
▼x Security measures.
▼a Hackers.
▼a COMPUTERS / Internet / Security
▼2 bisacsh
▼a COMPUTERS / Networking / Security
▼2 bisacsh
▼a COMPUTERS / Security / General
▼2 bisacsh
▼a Electronic books.
▼a Electronic books.
▼a Solomon, Michael
▼q (Michael G.),
▼d 1963-
▼i Print version:
▼a Oriyano, Sean-Philip
▼t Hacker Techniques, Tools, and Incident Handling.
▼d Burlington : Jones & Bartlett Learning, LLC,c2018,
▼z 9781284147803
▼a Jones & Bartlett Learning information systems security & assurance series.
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1874525
▼a EBL - Ebook Library
▼b EBLB
▼n EBL5494560
▼a YBP Library Services
▼b YANK
▼n 15659391
▼a EBSCOhost
▼b EBSC
▼n 1874525
▼a 강리원
▼a eBook
▼a 92
▼b N$T
| 자료유형 : | eBook |
|---|---|
| ISBN : | 9781284147810 |
| ISBN : | 1284147819 |
| ISBN : | |
| ISBN : | |
| 개인저자 : | Oriyano, Sean-Philip. |
| 서명/저자사항 : | Hacker techniques, tools, and incident handling [electronic resource] /: Sean-Philip Oriyano, Michael G. Solomon. |
| 판사항 : | Third edition. |
| 발행사항 : | Burlington, MA: Jones & Bartlett Learning, [2020]. |
| 형태사항 : | 1 online resource (886 p.). |
| 총서사항 : | Information systems security & assurance series |
| 일반주기 : | Controlling Access |
| 서지주기 : | Includes bibliographical references and index. |
| 내용주기 : | Cover; Title Page; Copyright Page; Contents; Preface; Acknowledgments; About the Authors; CHAPTER 1 Hacking: The Next Generation; Profiles and Motives of Different Types of Hackers; Controls; The Hacker Mindset; Motivation; A Look at the History of Computer Hacking; Ethical Hacking and Penetration Testing; The Role of Ethical Hacking; Ethical Hackers and the C-I-A Triad; Common Hacking Methodologies; Performing a Penetration Test; The Role of the Law and Ethical Standards; CHAPTER 2 TCP/IP Review; Exploring the OSI Reference Model; The Role of Protocols; Layer 1: Physical Layer |
| 내용주기 : | Layer 2: Data Link LayerLayer 3: Network Layer; Layer 4: Transport Layer; Layer 5: Session Layer; Layer 6: Presentation Layer; Layer 7: Application Layer; Mapping the OSI Model to Functions and Protocols; TCP/IP: A Layer-by-Layer Review; Physical or Network Access Layer; Network or Internet Layer; Host-to-Host Layer; Application Layer; CHAPTER 3 Cryptographic Concepts; Cryptographic Basics; Authentication; Integrity; Nonrepudiation; Symmetric and Asymmetric Cryptography; Cryptographic History; What Is an Algorithm or Cipher?; Symmetric Encryption; Asymmetric Encryption; Digital Signatures |
| 내용주기 : | Purpose of Public Key InfrastructureThe Role of Certificate Authorities (CAs); PKI Attacks; Hashing; Common Cryptographic Systems; Cryptanalysis; Future Forms of Cryptography; CHAPTER 4 Physical Security; Basic Equipment Controls; Hard Drive and Mobile Device Encryption; Fax Machines and Printers; Voice over IP (VoIP); Physical Area Controls; Fences; Perimeter Intrusion Detection and Assessment System (PIDAS); Gates; Bollards; Facility Controls; Doors, Mantraps, and Turnstiles; Walls, Ceilings, and Floors; Windows; Guards and Dogs; Construction; Personal Safety Controls; Lighting |
| 내용주기 : | Alarms and Intrusion DetectionClosed-Circuit TV (CCTV)/Remote Monitoring; Physical Access Controls; Locks; Lock Picking; Tokens and Biometrics; Avoiding Common Threats to Physical Security; Natural, Human, and Technical Threats; Physical Keystroke Loggers and Sniffers; Wireless Interception and Rogue Access Points; Defense in Depth; CHAPTER 5 Footprinting Tools and Techniques; The Information-Gathering Process; The Information on a Company Website; Discovering Financial Information; Google Hacking; Exploring Domain Information Leakage; Manual Registrar Query; Automatic Registrar Query; Whois |
| 내용주기 : | NslookupInternet Assigned Numbers Authority (IANA); Determining a Network Range; Tracking an Organization's Employees; Exploiting Insecure Applications; Using Social Networks; Using Basic Countermeasures; CHAPTER 6 Port Scanning; Determining the Network Range; Identifying Active Machines; Wardialing; Wardriving and Related Activities; Pinging; Port Scanning; Mapping Open Ports; Nmap; SuperScan; Scanrand; THC-Amap; OS Fingerprinting; Active OS Fingerprinting; Passive OS Fingerprinting; Mapping the Network; Analyzing the Results; CHAPTER 7 Enumeration and Computer System Hacking; Windows Basics |
| 일반주제명 : | Computer security. -- |
| 일반주제명 : | Penetration testing (Computer security) -- |
| 일반주제명 : | Computer networks -- Security measures. -- |
| 일반주제명 : | Hackers. -- |
| 일반주제명 : | COMPUTERS / Internet / Security -- |
| 일반주제명 : | COMPUTERS / Networking / Security -- |
| 일반주제명 : | COMPUTERS / Security / General -- |
| 개인저자 : | Solomon, Michael (Michael G.), 1963- |
| 기타형태 저록 : | Print version: Oriyano, Sean-Philip Hacker Techniques, Tools, and Incident Handling. Burlington : Jones & Bartlett Learning, LLC,c2018, 9781284147803 |
| 언어 | 영어 |
| URL : |
|---|
서평쓰기