|
|
|
|
LEADER |
02401nam a2200229 a 4500 |
001 |
988858 |
005 |
20171111231452.0 |
008 |
130523s2000 xxu r 001 0 eng d |
020 |
|
|
|a 1928994156
|
040 |
|
|
|a GrHeTEI
|b eng
|
050 |
|
4 |
|a QA76.9.A25
|b H33 2000
|
245 |
0 |
0 |
|a Hack proofing your network :
|b internet tradecraft /
|c Ryan Russell.
|
260 |
|
|
|a United States of America :
|b Syngress,
|c c2000.
|
300 |
|
|
|a xxix, 450 p. ;
|c 24 cm.
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Theory and Ideals -- Politics -- Definitions of the Word Hacker -- Hacker -- Cracker -- Script Kiddie -- Phreak -- White Hat/Black Hat -- Grey Hat -- Hacktivism -- The Role of the Hacker -- Criminal -- Magician -- Security Professional -- Consumer Advocate -- Civil Rights Activist -- Cyber Warrior -- Motivation -- Recognition -- Admiration -- Curiosity -- Power and Gain -- Revenge -- Legal/Moral Issues -- What's Illegal -- Reasonably Safe -- What's Right? -- Exceptions? -- The Hacker Code -- Public vs. Private Research -- Who Is Affected when an Exploit Is Released? -- Laws of Security -- What Are the Laws of Security? -- Client-side Security Doesn't Work -- Applying the Law -- Exceptions -- Defense -- You Can't Exchange Encryption Keys without a Shared Piece of Information -- Applying the Law -- Exceptions -- Defense -- Viruses and Trojans Cannot Be 100 Percent Protected Against -- Applying the Law -- Exceptions -- Defense -- Firewalls Cannot Protect You 100 Percent from Attack -- Applying the Law -- Social Engineering -- Attacking Exposed Servers -- Attacking the Firewall Directly -- Client-side Holes -- Exceptions -- Defense -- Secret Cryptographic Algorithms Are Not Secure -- Applying the Law -- Exceptions -- Defense -- If a Key Isn't Required, You Don't Have Encryption; You Have Encoding -- Applying the Law -- Exceptions -- Defense -- Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them -- Applying the Law -- Exceptions -- Defense.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|
650 |
|
0 |
|a Electronic information resources
|x Access control
|
650 |
|
4 |
|a Δίκτυα υπολογιστών
|x Μέτρα ασφαλείας
|
650 |
|
4 |
|a Ηλεκτρονικές πηγές πληροφόρησης
|x Έλεγχος πρόσβασης
|
700 |
1 |
|
|a Russell, Ryan
|
952 |
|
|
|a GRHeTEI
|b 59ccc8ea6c5ad1344608ae61
|c 998a
|d 945l
|e QA76.9 .A25 H33 2000
|t 1
|x m
|z Books
|