Language:
English
繁體中文
Help
回圖書館
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Hack the stack = using Snort and Eth...
~
Watkins, Stephen.
Hack the stack = using Snort and Ethereal to master the 8 layers of an insecure network /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Hack the stack/ lead author, Michael Gregg ; technical editor, Stephen Watkins.
Reminder of title:
using Snort and Ethereal to master the 8 layers of an insecure network /
Author:
Gregg, Michael
other author:
Watkins, Stephen.
Published:
Rockland, Mass. :Syngress Pub., : c2006,
Notes:
Title from e-book title screen (viewed May 21, 2008).
Subject:
Computer networks - Security measures. -
Online resource:
Connect to MyiLibrary resource
ISBN:
9786611279776
Hack the stack = using Snort and Ethereal to master the 8 layers of an insecure network /
Gregg, Michael
Hack the stack
using Snort and Ethereal to master the 8 layers of an insecure network /[electronic resource] :lead author, Michael Gregg ; technical editor, Stephen Watkins. - Rockland, Mass. :Syngress Pub.,c2006
Title from e-book title screen (viewed May 21, 2008).
Text.
Electronic reproduction.
UK :
MyiLibrary,
2008
Available via World Wide Web.
Mode of access: Internet via World Wide Web.
Digitized and made available by: Books24x7.com.
ISBN: 9786611279776Subjects--Topical Terms:
86541
Computer networks
--Security measures.Index Terms--Genre/Form:
96803
Electronic books.
LC Class. No.: TK5105.59 / .G74 2006eb
Dewey Class. No.: 005.8
Hack the stack = using Snort and Ethereal to master the 8 layers of an insecure network /
LDR
:01218nmm 22002773a 4500
001
181711
005
20070227154231.0
006
m d
007
cr zn |
008
160308s2006 maua s 001 0 eng d
020
$a
9786611279776
020
$z
1597491098 (Paper)
020
$z
0080507743 (electronic bk.)
035
$a
127977
$b
MIL
035
$a
cis8376381
040
$a
UK-RwCLS
$c
UK-RwCLS
050
1 4
$a
TK5105.59
$b
.G74 2006eb
082
0 4
$a
005.8
$2
22
100
1
$a
Gregg, Michael
$q
(Michael C.)
$3
352562
245
1 0
$a
Hack the stack
$h
[electronic resource] :
$b
using Snort and Ethereal to master the 8 layers of an insecure network /
$c
lead author, Michael Gregg ; technical editor, Stephen Watkins.
260
$a
Rockland, Mass. :
$c
c2006
$e
(Norwood, Mass. :
$f
Books24x7.com [generator])
$b
Syngress Pub.,
500
$a
Title from e-book title screen (viewed May 21, 2008).
516
$a
Text.
533
$a
Electronic reproduction.
$b
UK :
$c
MyiLibrary,
$d
2008
$n
Available via World Wide Web.
$n
Access may be limited to MIL affiliated libraries.
538
$a
Mode of access: Internet via World Wide Web.
550
$a
Digitized and made available by: Books24x7.com.
590
$a
Access is available to the Yale community.
650
0
$a
Computer networks
$x
Security measures.
$3
86541
650
0
$a
Computer security.
$3
86565
655
7
$a
Electronic books.
$2
local.
$3
96803
700
1
$a
Watkins, Stephen.
$4
edt
$3
354536
710
2
$a
MyiLibrary.
$3
311848
856
4
$z
Connect to MyiLibrary resource
$u
http://www.myilibrary.com?id=127977
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login