Foto 1 di 2


Galleria
Foto 1 di 2


Ne hai uno da vendere?
Hacking Exposed 5th Edition, Kurtz, George
US $7,69
CircaEUR 6,59
Condizione:
Buone condizioni
Libro che è già stato letto ma è in buone condizioni. Mostra piccolissimi danni alla copertina incluse alcune rigature, ma nessun foro o strappo. È possibile che la sovraccoperta per le copertine rigide non sia inclusa. La rilegatura presenta minimi segni di usura. La maggior parte delle pagine non è danneggiata e mostra una quantità minima di piegature o strappi, sottolineature di testo a matita, nessuna evidenziazione di testo né scritte ai margini. Non ci sono pagine mancanti. Per maggiori dettagli e la descrizione di eventuali imperfezioni, consulta l'inserzione del venditore.
2 disponibili
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Spedizione:
Gratis USPS Media MailTM.
Oggetto che si trova a: Montgomery Illinois, Stati Uniti
Consegna:
Consegna prevista tra il lun 8 set e il gio 11 set a 94104
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico del venditore.
Pagamenti:
Fai shopping in tutta sicurezza
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:276949841662
Specifiche dell'oggetto
- Condizione
- Book Title
- Hacking Exposed 5th Edition
- ISBN
- 0072260815
- EAN
- 9780072260816
- Release Title
- Hacking Exposed 5th Edition
- Artist
- Kurtz, George
- Brand
- N/A
- Colour
- N/A
Informazioni su questo prodotto
Product Identifiers
Publisher
McGraw-Hill Osborne
ISBN-10
0072260815
ISBN-13
9780072260816
eBay Product ID (ePID)
45029562
Product Key Features
Number of Pages
720 Pages
Publication Name
Hacking Exposed 5th Edition : Network Security Secrets and Solutions
Language
English
Subject
Networking / General, Security / General
Publication Year
2005
Features
Revised
Type
Textbook
Subject Area
Computers
Series
Hacking Exposed Ser.
Format
Trade Paperback
Dimensions
Item Height
1.4 in
Item Weight
41.2 Oz
Item Length
8.9 in
Item Width
7.3 in
Additional Product Features
Edition Number
5
Intended Audience
College Audience
LCCN
2006-530763
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
"A must-read for anyone in security…. One of the best security books available." --Tony Bradley, CISSP, About.com "Authoritative….Even readers of earlier editions will find critical new insight on the more modern attacks." --From the Foreword by Gene Hodges, President of McAfee "A cross between a spy novel and a tech manual." --Mark A. Kellner,Washington Times "The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure." -Bill Machrone,PC Magazine "With every edition this book keeps getting better and better. I can recommend it to anyone interested in computer security, as it will certainly give you a real-world course on the subject." -Mirko Zorz, Net-security.org The fifth edition of this world-renowned security reference offers completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using the provenHacking Exposedmethodology, the book shows you, step by step, how to locate and patch system vulnerabilities and explains what you need to know to stay vigilant in today's 24x7 digital world.New and Updated Material: New chapter on hacking code, with contributions by Michael Howard, covering the ways flaws get introduced into software and how best to prevent them New Windows hacks including RPCSS (Blaster), LSASS (Sasser), and PCT (Download.ject) buffer overflow exploits Updated denial of service chapter with descriptions of large scale zombie attacks and practical countermeasures Coverage of new web hacking tools and techniques including HTTP response splitting and automated vulnerability scanners New content on remote connectivity including VoIP hacking New coverage of web and e-mail client hacking, including the latest Internet Explorer exploits, phishing, spyware, rootkits, and bots New hacks and countermeasures using Google as a reconnaissance tool An updated footprinting chapter that deals with changes regarding finding information from Internet databases Brand new case studies covering relevant and timely security attacks including Google, wireless, UNIX/Linux, and Mac OS X hacks
Edition Description
Revised edition
Synopsis
Using real-world case studies, this work shows IT professionals how to protect computers and networks against the security vulnerabilities. It provides detailed examples of devious break-ins and helps you learn how to think like a hacker in order to thwart attacks. It also covers code hacking methods and countermeasures.
LC Classification Number
TK5105.59
Descrizione dell'oggetto fatta dal venditore
Informazioni sul venditore professionale
Informazioni su questo venditore
worldofbooksinc
97,7% di Feedback positivi•1,2 milioni oggetti venduti
Registrato come venditore professionale
Feedback sul venditore (276.720)
- f***f (1606)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoExcellent Seller, Goes the Extra Mile. The Seller Was Incredibly Communicative. Smooth Transaction, Shipped Very Quickly, As Advertised; Good Price; Well Packaged & Delivered Within a Few Days. Item in Described Promised Condition, Thank You Very Much!!!!!!!!!!! A+The Angels of Lockhart, Wiley, Thomas L. (N° 316568691808)
- p***m (271)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoA+ Highest Rating for this transaction. Nova Classic Volume 2 - Marvel / Paperback - condition & quality look really good, ALMOST NEW even better than described. Shipping was Fast (1 week) / packaging was thin mylar mailer, but no visible damage to book. Great price AND free shipping. I buy here often, and this transaction was flawless. 5 STARS
- t***2 (162)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoThis was a paperback/softcover 29 year old book I purchased in very good condition as described. However it was delivered in a plain white plastic envelope. They should have at least used a bubble pack lined shipping envelope for protection of the item inside. They should re-think their shipping & packaging strategies, especially with much much older delicate items. Other wise no problems whatsoever with seller. Recommended seller. A+