LEADER 02896nmm a2200625 u 4500
001 EB001936747
003 EBX01000000000000001099649
005 20251104000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780596551438 
020 |a 9780596515508 
020 |a 9780596527631 
020 |a 0596527632 
020 |a 0596515502 
050 4 |a TK5105.59 
100 1 |a Lockhart, Andrew 
245 0 0 |a Network security hacks  |c Andrew Lockhart 
250 |a 2nd ed 
260 |a Sebastopol, Calif.  |b O'Reilly  |c 2006 
300 |a 1 online resource 
653 |a COMPUTERS / Security / General / bisacsh 
653 |a Internet / Security measures / blmlsh 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Internet / Sécurité / Mesures 
653 |a Betriebssystem / gnd 
653 |a Computer security / fast 
653 |a Computersicherheit / gnd 
653 |a Computer networks / Security measures / blmlsh 
653 |a Eindringerkennung / gnd 
653 |a Datensicherung / gnd 
653 |a Internet / Security measures / fast 
653 |a Computer networks / Security measures / fast 
653 |a Rechnernetz / gnd 
653 |a Internet / gnd / http://d-nb.info/gnd/4308416-3 
653 |a Computer security 
653 |a Kommunikationsprotokoll / gnd 
653 |a Computer security / blmlsh 
653 |a COMPUTERS / Internet / Security / bisacsh 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Virtuelles privates Netzwerk / gnd 
653 |a COMPUTERS / Networking / Security / bisacsh 
653 |a Sécurité informatique 
653 |a Internet / Security measures 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a Hacks series 
500 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 
776 |z 0596515502 
776 |z 0596527632 
776 |z 9780596515508 
856 4 0 |u https://learning.oreilly.com/library/view/~/0596527632/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 L816 2006 [ONLINE] 
520 |a In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security Hacks offers 12