Network security assessment

There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild...

Full description

Bibliographic Details
Main Author: McNab, Chris 1980- (-)
Format: eBook
Language:Inglés
Published: Sebastopol, California : O'Reilly Media, Inc 2004.
Edition:First edition
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009626948806719
Description
Summary:There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new attack one-by-one is a bit like emptying the Atlantic with paper cup. If you're a network administrator, the pressure is on you to defend your systems from attack. But short of devoting your
Item Description:"Know your network"--Cover.
Includes index.
Physical Description:1 online resource (400 p.)
Available also in a print edition
Bibliography:Includes bibliographical references (p. 354-355) and index.
ISBN:9780596520809
9780596552558