Hacking exposed Windows : Windows security secrets & solutions / Joel Scambray, Stuart McClure.
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Female Library | QA76.9 .A25 S3 2008 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000175131 | |
![]() |
Main Library | QA76.9 .A25 S3 2008 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000156819 |
Browsing Main Library shelves Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.9 .A25 K39 2002 Network security : private communication in a public world / | QA76.9 .A25 M485 2006 Information security : principles and practices / | QA76.9 .A25 P45 2007 Security in computing / | QA76.9 .A25 S3 2008 Hacking exposed Windows : Windows security secrets & solutions / | QA76.9 .A25 S466 2005 Enterprise security architecture : a business-driven approach / | QA76.9 .A25 V359 2007 Testing code security / | QA76.9 .A43 B35 2004 Algorithms and data structures : the science of computing / |
Information security basics -- The Windows security architecture from the hacker's perspective -- Footprinting and scanning -- Enumeration -- Hacking Windows-specific services -- Discovering and exploiting Windows vulnerabilities -- Post-exploit pillaging -- Achieving stealth and maintaining presence -- Hacking SQL server -- Hacking Microsoft client apps -- Physical attacks -- Windows security features and tools -- Appendices. Windows security checklist ; About the companion website.
1 2
There are no comments on this title.