Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses

“I finally get it! I used to hear words like rootkit, buffer overflow, and idle scanning, and they just didn’t make any sense. I asked other people and they didn’t seem to know how these things work, or at least they couldn’t explain them in a way that I could understand. Counter Hack Reloaded is th...

Descripción completa

Detalles Bibliográficos
Otros Autores: Skoudis, Ed Author (author), Liston, Tom Contributor (contributor), Skoudis, Ed Contributor
Formato: Libro electrónico
Idioma:Inglés
Publicado: [Place of publication not identified] Prentice Hall Professional Technical Reference 2006
Edición:2nd ed
Colección:Radia Perlman series in computer networking and security
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009626987206719

Ejemplares similares