|
|
|
|
LEADER |
03001nmm a2200613 u 4500 |
001 |
EB001936747 |
003 |
EBX01000000000000001099649 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 0596527632
|
020 |
|
|
|a 9780596527631
|
020 |
|
|
|a 9780596515508
|
020 |
|
|
|a 9780596551438
|
020 |
|
|
|a 0596515502
|
050 |
|
4 |
|a TK5105.59
|
100 |
1 |
|
|a Lockhart, Andrew
|
245 |
0 |
0 |
|a Network security hacks
|c Andrew Lockhart
|
250 |
|
|
|a 2nd ed
|
260 |
|
|
|a Sebastopol, Calif.
|b O'Reilly
|c 2006
|
300 |
|
|
|a 1 online resource
|
653 |
|
|
|a Internet / Security measures
|
653 |
|
|
|a Computersicherheit / gnd
|
653 |
|
|
|a Computer networks / Security measures / blmlsh
|
653 |
|
|
|a Computer security / blmlsh
|
653 |
|
|
|a Computer security / fast
|
653 |
|
|
|a COMPUTERS / Security / General / bisacsh
|
653 |
|
|
|a Computer security
|
653 |
|
|
|a Virtuelles privates Netzwerk / gnd / http://d-nb.info/gnd/4501379-2
|
653 |
|
|
|a Internet / gnd / http://d-nb.info/gnd/4308416-3
|
653 |
|
|
|a Rechnernetz / gnd / http://d-nb.info/gnd/4070085-9
|
653 |
|
|
|a Internet / Security measures / fast
|
653 |
|
|
|a Betriebssystem / gnd / http://d-nb.info/gnd/4006216-8
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Internet / Sécurité / Mesures
|
653 |
|
|
|a Eindringerkennung / gnd
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a COMPUTERS / Internet / Security / bisacsh
|
653 |
|
|
|a COMPUTERS / Networking / Security / bisacsh
|
653 |
|
|
|a Computer networks / Security measures / fast
|
653 |
|
|
|a Datensicherung / gnd
|
653 |
|
|
|a Kommunikationsprotokoll / gnd / http://d-nb.info/gnd/4128252-8
|
653 |
|
|
|a Internet / Security measures / blmlsh
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
490 |
0 |
|
|a Hacks series
|
500 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002
|
776 |
|
|
|z 0596515502
|
776 |
|
|
|z 9780596515508
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0596527632/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8 L816 2006 [ONLINE]
|
082 |
0 |
|
|a 331
|
520 |
|
|
|a In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security Hacks offers 12
|