000 01040 a2200181 4500
003 Nust
005 20220725182013.0
010 _a 2013939807
020 _a9780840020932
040 _cNust
082 _a005.8,BAS
100 1 _aBasta, Alfred.
_928828
245 1 0 _aComputer security and penetration testing /
_cAlfred Basta, Nadine Basta, Mary Brown.
250 _a2nd Ed.
300 _axix;376 p,
505 _aEthics of Hacking and Cracking. (Page-1), Reconnaissance. (Page-17) , Scanning Tools. (Page-45), Sniffers. ( Page-67), TCP/IP Vulnerabilities (Page-95), Techniques of Password Cracking. ( Page-115), Spoofing. (Page-137), Session Hijacking. (Page-157), Hacking Network Devices (Page-175), Trojan Horses ( Page-195), Denial of Service Attacks. (Page-211), Buffer Overflows (Page-231), Programming Exploits (Page-249), Mail Vulnerabilities (Page-265), Web Application Vulnerabilities ( Page-289) Windows Vulnerabilities (Page-311), Linux Vulnerabilities (Page-321), Incident Handling (Page-335).
942 _2ddc
_cBK
999 _c213874
_d213874