skip to content
Special ops : host and network security for microsoft, unix, and oracle. Preview this item
ClosePreview this item
Checking...

Special ops : host and network security for microsoft, unix, and oracle.

Author: Erik Birkholz
Publisher: Sebastopol : O'Reilly Media, 2003.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
A book on internal network security, which uses a two-pronged approach - Tactical and Strategic - to give readers a guide to internal penetration testing. Its content includes the vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Syngress.
Special Ops: Host and Network Security for Microsoft Unix and Oracle.
: Elsevier Science, ©2014
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Erik Birkholz
ISBN: 0080481051 9780080481050
OCLC Number: 191035015
Description: 1 online resource
Contents: 1931836698.pdf; 1931836698.pdf; Cover; Table of Contents; Foreword; Chapter 1 Assessing Internal Network Security; Chapter 2 Inventory and Exposure of Corporate Assets; Chapter 3 Hunting for High Severity Vulnerabilities (HSV); Chapter 4 Attacking and Defending Windows XP Professional; Chapter 5 Attacking and Defending Windows 2000; Chapter 6 Securing Active Directory; Chapter 7 Securing Exchange and Outlook Web Access; Chapter 8 Attacking and Defending DNS; Chapter 9 Attacking and Defending Microsoft Terminal Services; Chapter 10 Securing IIS; Chapter 11 Hacking Custom Web Applications.

Abstract:

A book on internal network security, which uses a two-pronged approach - Tactical and Strategic - to give readers a guide to internal penetration testing. Its content includes the vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/191035015> # Special ops : host and network security for microsoft, unix, and oracle.
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "191035015" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/793897622#Place/sebastopol> ; # Sebastopol
    schema:about <http://experiment.worldcat.org/entity/work/data/793897622#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/793897622#CreativeWork/oracle_computer_file> ; # Oracle (Computer file)
    schema:about <http://dewey.info/class/005.8/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/793897622#CreativeWork/unix_computer_file> ; # UNIX (Computer file)
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/793897622#Person/birkholz_erik> ; # Erik Birkholz
    schema:datePublished "2003" ;
    schema:description "A book on internal network security, which uses a two-pronged approach - Tactical and Strategic - to give readers a guide to internal penetration testing. Its content includes the vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies."@en ;
    schema:description "1931836698.pdf; 1931836698.pdf; Cover; Table of Contents; Foreword; Chapter 1 Assessing Internal Network Security; Chapter 2 Inventory and Exposure of Corporate Assets; Chapter 3 Hunting for High Severity Vulnerabilities (HSV); Chapter 4 Attacking and Defending Windows XP Professional; Chapter 5 Attacking and Defending Windows 2000; Chapter 6 Securing Active Directory; Chapter 7 Securing Exchange and Outlook Web Access; Chapter 8 Attacking and Defending DNS; Chapter 9 Attacking and Defending Microsoft Terminal Services; Chapter 10 Securing IIS; Chapter 11 Hacking Custom Web Applications."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/793897622> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/793897622#CreativeWork/special_ops_host_and_network_security_for_microsoft_unix_and_oracle> ;
    schema:name "Special ops : host and network security for microsoft, unix, and oracle."@en ;
    schema:productID "191035015" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/191035015#PublicationEvent/sebastopol_o_reilly_media_2003> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/793897622#Agent/o_reilly_media> ; # O'Reilly Media
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=294373> ;
    schema:url <http://www.123library.org/book_details/?id=36362> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=294373> ;
    schema:url <http://www.myilibrary.com?id=105581> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=4052594> ;
    schema:workExample <http://worldcat.org/isbn/9780080481050> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/191035015> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/793897622#Agent/o_reilly_media> # O'Reilly Media
    a bgn:Agent ;
    schema:name "O'Reilly Media" ;
    .

<http://experiment.worldcat.org/entity/work/data/793897622#CreativeWork/oracle_computer_file> # Oracle (Computer file)
    a schema:CreativeWork ;
    schema:name "Oracle (Computer file)" ;
    .

<http://experiment.worldcat.org/entity/work/data/793897622#CreativeWork/unix_computer_file> # UNIX (Computer file)
    a schema:CreativeWork ;
    schema:name "UNIX (Computer file)" ;
    .

<http://experiment.worldcat.org/entity/work/data/793897622#Person/birkholz_erik> # Erik Birkholz
    a schema:Person ;
    schema:familyName "Birkholz" ;
    schema:givenName "Erik" ;
    schema:name "Erik Birkholz" ;
    .

<http://experiment.worldcat.org/entity/work/data/793897622#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://worldcat.org/entity/work/data/793897622#CreativeWork/special_ops_host_and_network_security_for_microsoft_unix_and_oracle>
    a schema:CreativeWork ;
    rdfs:label "Special Ops: Host and Network Security for Microsoft Unix and Oracle." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/191035015> ; # Special ops : host and network security for microsoft, unix, and oracle.
    .

<http://worldcat.org/isbn/9780080481050>
    a schema:ProductModel ;
    schema:isbn "0080481051" ;
    schema:isbn "9780080481050" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.