Hack the stack using snort and ethereal to master the 8 layers of an insecure network
Κύριος συγγραφέας: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Βιβλίο |
Γλώσσα: | Greek |
Έκδοση: |
Syngress Media
|
MARC
LEADER | 00000cam a22000001 4500 | ||
---|---|---|---|
001 | 1/229 | ||
010 | |a 1-59749-109-8 | ||
035 | |l 10016031 | ||
100 | |a 20161011d2006 y0grey010503 ba | ||
101 | 0 | |a gre | |
200 | 1 | |a Hack the stack |e using snort and ethereal to master the 8 layers of an insecure network |f Michael Gregg... [et al.] |g Stephen Watkins, technical editor | |
210 | |a Rockland, MA |c Syngress |d c2006 | ||
215 | |a xxiv, 442 p. |c fig., tabl. |e 23 cm. | ||
300 | |a Includes bibliographical references and index | ||
606 | 0 | |a Υπολογιστές |x Δίκτυα |x Μέτρα ασφαλείας | |
606 | 0 | |a Ασφάλεια υπολογιστών | |
615 | |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) | ||
676 | |a 005.8 | ||
701 | 1 | |a Gregg |b Michael C. |4 070 | |
702 | 1 | |a Watkins |b Stephen |4 340 | |
709 | |a Syngress Media | ||
801 | 0 | |a GR |b ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 |c 20161011 |g AACR2 | |
852 | |a INST |b LIBRARY |e 20161011 |h 005.8 HAC |p 000040676 |q 000040676 |t BK |y 23 |z 1 | ||
909 | |b 037453 | ||
960 | |a ΟΚΤΩΒΡΙΟΣ 2016 |
Εγγραφή στο Ευρετήριο Αναζήτησης
_version_ | 1780545240678006784 |
---|---|
author | Gregg Michael C. |
author2 | Watkins Stephen |
author2_role | 340 |
author2_variant | w s ws |
author_facet | Gregg Michael C. Watkins Stephen |
author_role | 070 |
author_sort | Gregg Michael C. |
author_variant | g m c gmc |
building | Campus Library II |
collection | LIB2 Catalog |
dewey-full | 005.8 |
dewey-hundreds | 000 |
dewey-ones | 005 |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 |
format | Book |
fullrecord | {"leader":"01088cam a22002651 4500","fields":[{"001":"1/229"},{"010":{"subfields":[{"a":"1-59749-109-8"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10016031"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20161011d2006 y0grey010503 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"gre"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Hack the stack"},{"e":"using snort and ethereal to master the 8 layers of an insecure network"},{"f":"Michael Gregg... [et al.]"},{"g":"Stephen Watkins, technical editor"}],"ind1":"1","ind2":" "}},{"210":{"subfields":[{"a":"Rockland, MA"},{"c":"Syngress"},{"d":"c2006"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xxiv, 442 p."},{"c":"fig., tabl."},{"e":"23 cm."}],"ind1":" ","ind2":" "}},{"300":{"subfields":[{"a":"Includes bibliographical references and index"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u03a5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0394\u03af\u03ba\u03c4\u03c5\u03b1"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.8"}],"ind1":" ","ind2":" "}},{"701":{"subfields":[{"a":"Gregg"},{"b":"Michael C."},{"4":"070"}],"ind1":" ","ind2":"1"}},{"702":{"subfields":[{"a":"Watkins"},{"b":"Stephen"},{"4":"340"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Syngress Media"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. - \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"c":"20161011"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20161011"},{"h":"005.8 HAC"},{"p":"000040676"},{"q":"000040676"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"037453"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u039f\u039a\u03a4\u03a9\u0392\u03a1\u0399\u039f\u03a3 2016"}],"ind1":" ","ind2":" "}}]}
|
id | lib2_1/229 |
illustrated | Illustrated |
institution | University of West Attica |
isbn | 1-59749-109-8 |
language | Greek |
physical | xxiv, 442 p. fig., tabl. 23 cm. |
publishDate | 2006 |
publisher | Syngress Media |
record_format | marc |
spelling | 20161011d2006 y0grey010503 ba gre Hack the stack using snort and ethereal to master the 8 layers of an insecure network Michael Gregg... [et al.] Stephen Watkins, technical editor Rockland, MA Syngress c2006 xxiv, 442 p. fig., tabl. 23 cm. Includes bibliographical references and index Υπολογιστές Δίκτυα Μέτρα ασφαλείας Ασφάλεια υπολογιστών ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 005.8 Gregg Michael C. 070 Watkins Stephen 340 Syngress Media GR ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 20161011 AACR2 INST LIBRARY 20161011 005.8 HAC 000040676 000040676 BK 23 1 |
spellingShingle | Gregg Michael C. Hack the stack using snort and ethereal to master the 8 layers of an insecure network Υπολογιστές Δίκτυα Μέτρα ασφαλείας Ασφάλεια υπολογιστών ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
title | Hack the stack using snort and ethereal to master the 8 layers of an insecure network |
title_auth | Hack the stack using snort and ethereal to master the 8 layers of an insecure network |
title_full | Hack the stack using snort and ethereal to master the 8 layers of an insecure network Michael Gregg... [et al.] Stephen Watkins, technical editor |
title_fullStr | Hack the stack using snort and ethereal to master the 8 layers of an insecure network Michael Gregg... [et al.] Stephen Watkins, technical editor |
title_full_unstemmed | Hack the stack using snort and ethereal to master the 8 layers of an insecure network Michael Gregg... [et al.] Stephen Watkins, technical editor |
title_short | Hack the stack |
title_sub | using snort and ethereal to master the 8 layers of an insecure network |
topic | Υπολογιστές Δίκτυα Μέτρα ασφαλείας Ασφάλεια υπολογιστών ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
topic_facet | Υπολογιστές Δίκτυα Μέτρα ασφαλείας Ασφάλεια υπολογιστών |