Computer security and penetration testing / Alfred Basta, Nadine Basta, Mary Brown.

By: Basta, AlfredEdition: 2nd EdDescription: pages cmISBN: 9780840020932DDC classification: 005.8,BAS
Contents:
Ethics of Hacking and Cracking. (Page-1), Reconnaissance (Page-17), Scanning Tools (Page-45), Sniffers (Page-67), TCP/IP Vulnerabilities. (Page-95), Techniques of Password Cracking (Page-115), Spoofing (Page-137), Session Hijacking (Page-157), Hacking Network Devices ( Page-175), Trojan Horses ( Page-195), Denial of Service Attacks (Page-211), Buffer Overflows ( Page-231), Programming Exploits (Page-249), Mail Vulnerabilities (Page-265), Web Application Vulnerabilities (Page-289), Windows Vulnerabilities (Page-311), Linux Vulnerabilities, (Page-321), Incident Handling, (Page-335).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number URL Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,BAS (Browse shelf) Link to resource Available Almirah No.8, Shelf No.6 MCS37170
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,BAS (Browse shelf) Link to resource Checked out to ASC Shahrukh Abrar (37401-3223798-1) Almirah No.8, Shelf No.6 03/06/2025 MCS37171
Total holds: 0
Browsing Military College of Signals (MCS) shelves, Shelving location: General Stacks Close shelf browser

Ethics of Hacking and Cracking. (Page-1), Reconnaissance (Page-17), Scanning Tools (Page-45), Sniffers (Page-67), TCP/IP Vulnerabilities. (Page-95), Techniques of Password Cracking (Page-115), Spoofing (Page-137), Session Hijacking (Page-157), Hacking Network Devices ( Page-175), Trojan Horses ( Page-195), Denial of Service Attacks (Page-211), Buffer Overflows ( Page-231), Programming Exploits (Page-249), Mail Vulnerabilities (Page-265), Web Application Vulnerabilities (Page-289), Windows Vulnerabilities (Page-311), Linux Vulnerabilities, (Page-321), Incident Handling, (Page-335).

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.