Web hacking : Attacks and defense / by Stuart McClure, Joel Scambray, George Kurtz.

By: McClure, StuartContributor(s): Scambray, Joel | Kurtz, GeorgeMaterial type: TextTextPublication details: New York : McGraw-Hill, c2006Edition: 10th anniversary edDescription: xxxi, 492 p. : ill. ; 23 cmISBN: 8177582313 (pbk.); 0071613749 (pbk.)Subject(s): Computer networks -- Security measures | Computer security | Data protectionDDC classification: 005.8 LOC classification: TK5105.59 | .M48 2009
Contents:
Casing the establishment. Footprinting -- Scanning -- Enumeration -- System hacking. Hacking Windows -- Hacking Unix -- Infrastructure hacking. Remote connectivity and VoIP hacking -- Network devices -- Wireless hacking -- Hacking hardware -- Application and data hacking. Hacking code -- Web hacking -- Hacking the internet user -- Appendices: Ports ; Top 14 security vulnerabilities ; Denial of service (DoS) and distributed denial of service (DDoS) attacks.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books Books Namal Library
Computer Science
005.8 MCC-W 2006 1997 (Browse shelf (Opens below)) Available 0001997
Total holds: 0
Browsing Namal Library shelves, Shelving location: Computer Science Close shelf browser (Hides shelf browser)
005.8 MAI-F 2004 893 Fundamentals of network security / 005.8 MAN-H 2000 829 Hacker Attack / 005.8 MCC-H 2012 7166 Hacking exposed 7: 005.8 MCC-W 2006 1997 Web hacking : 005.8 MEA-C 2017 9726 Cyber security engineering : 005.8 MEN-N 2011 3793 Network security and cryptography / 005.8 MER-I 2007 1515 Information security :

Includes index.

Casing the establishment. Footprinting -- Scanning -- Enumeration -- System hacking. Hacking Windows -- Hacking Unix -- Infrastructure hacking. Remote connectivity and VoIP hacking -- Network devices -- Wireless hacking -- Hacking hardware -- Application and data hacking. Hacking code -- Web hacking -- Hacking the internet user -- Appendices: Ports ; Top 14 security vulnerabilities ; Denial of service (DoS) and distributed denial of service (DDoS) attacks.

There are no comments on this title.

to post a comment.