LDR
|
·····nam##22·····1a#4500
|
008
|
170825s2001####us#a##########0||#0|eng|d
|
100 |
1# |
$a Chirillo, John. |
245 |
10 |
$a Hack Attacks Revealed : $b A Complete Reference with Custom Security Hacking Toolkit / $c John Chirillo. |
260 |
## |
$a New York : $b John Wiley & Sons, $c 2001. |
300 |
## |
$a xvi, 944 p. : $b graf. ; $c 24 cm. |
500 |
## |
$a Appendix A: IP Reference Table and Subnetting Charts (Pág. 789-792). |
500 |
## |
$a Appendix B: Well-Known Ports and Services (Pág. 793-797). |
500 |
## |
$a Appendix C: All-Inclusive Ports and Services (Pág. 799-837). |
500 |
## |
$a Appendix D: Detrimental Ports and Services (Pág. 839-844). |
500 |
## |
$a Appendix E: What's ont the CD (Pág. 845-857). |
500 |
## |
$a Appendix F: Most Common Viruses (Pág. 859-876). |
500 |
## |
$a Appendix G: Vendor Codes (Pág. 877-918). |
500 |
## |
$a Glossary: Vendor Codes (Pág. 919-926). |
500 |
## |
$a References (Pág. 927-928). |
500 |
## |
$a Index (Pág. 929-944). |
653 |
## |
$a VULNERABILIDAD. |
653 |
## |
$a PROTOCOLOS DE COMUNICACION. |