Hack the stack using snort and ethereal to master the 8 layers of an insecure network

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Gregg Michael C. (Συγγραφέας)
Άλλοι συγγραφείς: Watkins Stephen (Επιμελητής Έκδοσης)
Μορφή: Βιβλίο
Γλώσσα:Greek
Έκδοση: Syngress Media

MARC

LEADER 00000cam a22000001 4500
001 1/229
010 |a 1-59749-109-8 
035 |l 10016031 
100 |a 20161011d2006 y0grey010503 ba 
101 0 |a gre 
200 1 |a Hack the stack  |e using snort and ethereal to master the 8 layers of an insecure network  |f Michael Gregg... [et al.]  |g Stephen Watkins, technical editor 
210 |a Rockland, MA  |c Syngress  |d c2006 
215 |a xxiv, 442 p.  |c fig., tabl.  |e 23 cm. 
300 |a Includes bibliographical references and index 
606 0 |a Υπολογιστές  |x Δίκτυα  |x Μέτρα ασφαλείας 
606 0 |a Ασφάλεια υπολογιστών 
615 |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 
676 |a 005.8 
701 1 |a Gregg  |b Michael C.  |4 070 
702 1 |a Watkins  |b Stephen  |4 340 
709 |a Syngress Media 
801 0 |a GR  |b ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2  |c 20161011  |g AACR2 
852 |a INST  |b LIBRARY  |e 20161011  |h 005.8 HAC  |p 000040676  |q 000040676  |t BK  |y 23  |z 1 
909 |b 037453 
960 |a ΟΚΤΩΒΡΙΟΣ 2016 

Εγγραφή στο Ευρετήριο Αναζήτησης

_version_ 1780545240678006784
author Gregg Michael C.
author2 Watkins Stephen
author2_role 340
author2_variant w s ws
author_facet Gregg Michael C.
Watkins Stephen
author_role 070
author_sort Gregg Michael C.
author_variant g m c gmc
building Campus Library II
collection LIB2 Catalog
dewey-full 005.8
dewey-hundreds 000
dewey-ones 005
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000
format Book
fullrecord {"leader":"01088cam a22002651 4500","fields":[{"001":"1/229"},{"010":{"subfields":[{"a":"1-59749-109-8"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10016031"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20161011d2006 y0grey010503 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"gre"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Hack the stack"},{"e":"using snort and ethereal to master the 8 layers of an insecure network"},{"f":"Michael Gregg... [et al.]"},{"g":"Stephen Watkins, technical editor"}],"ind1":"1","ind2":" "}},{"210":{"subfields":[{"a":"Rockland, MA"},{"c":"Syngress"},{"d":"c2006"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xxiv, 442 p."},{"c":"fig., tabl."},{"e":"23 cm."}],"ind1":" ","ind2":" "}},{"300":{"subfields":[{"a":"Includes bibliographical references and index"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u03a5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0394\u03af\u03ba\u03c4\u03c5\u03b1"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.8"}],"ind1":" ","ind2":" "}},{"701":{"subfields":[{"a":"Gregg"},{"b":"Michael C."},{"4":"070"}],"ind1":" ","ind2":"1"}},{"702":{"subfields":[{"a":"Watkins"},{"b":"Stephen"},{"4":"340"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Syngress Media"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. - \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"c":"20161011"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20161011"},{"h":"005.8 HAC"},{"p":"000040676"},{"q":"000040676"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"037453"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u039f\u039a\u03a4\u03a9\u0392\u03a1\u0399\u039f\u03a3 2016"}],"ind1":" ","ind2":" "}}]}
id lib2_1/229
illustrated Illustrated
institution University of West Attica
isbn 1-59749-109-8
language Greek
physical xxiv, 442 p. fig., tabl. 23 cm.
publishDate 2006
publisher Syngress Media
record_format marc
spelling 20161011d2006 y0grey010503 ba
gre
Hack the stack using snort and ethereal to master the 8 layers of an insecure network Michael Gregg... [et al.] Stephen Watkins, technical editor
Rockland, MA Syngress c2006
xxiv, 442 p. fig., tabl. 23 cm.
Includes bibliographical references and index
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Ασφάλεια υπολογιστών
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
005.8
Gregg Michael C. 070
Watkins Stephen 340
Syngress Media
GR ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 20161011 AACR2
INST LIBRARY 20161011 005.8 HAC 000040676 000040676 BK 23 1
spellingShingle Gregg Michael C.
Hack the stack using snort and ethereal to master the 8 layers of an insecure network
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Ασφάλεια υπολογιστών
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
title Hack the stack using snort and ethereal to master the 8 layers of an insecure network
title_auth Hack the stack using snort and ethereal to master the 8 layers of an insecure network
title_full Hack the stack using snort and ethereal to master the 8 layers of an insecure network Michael Gregg... [et al.] Stephen Watkins, technical editor
title_fullStr Hack the stack using snort and ethereal to master the 8 layers of an insecure network Michael Gregg... [et al.] Stephen Watkins, technical editor
title_full_unstemmed Hack the stack using snort and ethereal to master the 8 layers of an insecure network Michael Gregg... [et al.] Stephen Watkins, technical editor
title_short Hack the stack
title_sub using snort and ethereal to master the 8 layers of an insecure network
topic Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Ασφάλεια υπολογιστών
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
topic_facet Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Ασφάλεια υπολογιστών