000 00993 a2200229 4500
003 Nust
005 20170207154032.0
010 _a 00102952
020 _a0735710090 (pbk.)
035 _a(DLC)11958808
040 _cNust
082 0 0 _a005.8
100 1 _aCole, Eric.
245 1 0 _aHackers beware -(E-BOOK)
_cEric Cole.
250 _a1st ed.
260 _aIndianapolis, Ind. :
_bNew Riders,
_cc2002.
300 _axvii, 778 p. :
_bill. ;
_c23 cm.
505 _a1. Introduction 2. How and Why Hackers Do It 3. Information Gathering 4. Spoofing 5. Session Hijacking 6. Denial of Service Attacks 7. Buffer Overflow Attacks 8. Password Security 9. Microsoft NT Password Crackers 10. UNIX Password Crackers 12. Specific Exploits for NT 13. Fundamentals of UNIX 14. Specific Exploits for UNIX 15. Preserving Access 16. Covering the Tracks 17. Other Types of Attacks 18. SANS Top 10 19. Putting It All Together
650 0 _aComputer hackers.
650 0 _aComputer security.
651 _aE-BOOK
942 _2ddc
_cBK
999 _c192217
_d192217