Network security assessment

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: McNab, Chris 1980- (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Beijing [u.a.] O'Reilly 2004
Ausgabe:1. ed.
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV019426705
003 DE-604
005 20170222
007 t|
008 041015s2004 xx |||| 00||| eng d
016 7 |a 969911483  |2 DE-101 
020 |a 059600611X  |c Kt. : EUR 38.00 (freier Pr.)  |9 0-596-00611-X 
024 3 |a 9780596006112 
024 1 |a 636920006114 
035 |a (OCoLC)442364843 
035 |a (DE-599)BVBBV019426705 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
049 |a DE-706 
050 0 |a QA76.9.A25 
080 |a 004.7 
082 0 |a 005.8  |2 22 
084 |a ST 200  |0 (DE-625)143611:  |2 rvk 
084 |a 004  |2 sdnb 
100 1 |a McNab, Chris  |d 1980-  |e Verfasser  |0 (DE-588)131828967  |4 aut 
245 1 0 |a Network security assessment  |c Chris McNab 
250 |a 1. ed. 
264 1 |a Beijing [u.a.]  |b O'Reilly  |c 2004 
300 |a XXI, 371 S. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
650 4 |a Internet - Server - Computersicherheit - Datensicherung - Leistungsbewertung 
650 4 |a Rechnernetz - Betriebssystem - Computersicherheit - Datensicherung - Leistungsbewertung 
650 4 |a Rechnernetz - Computersicherheit - Datensicherung - Leistungsbewertung - Checkliste 
650 4 |a Rechnernetz - Kommunikationsprotokoll - Computersicherheit - Datensicherung - Leistungsbewertung 
650 4 |a Computer networks  |x Security measures  |x Evaluation 
650 4 |a Computers  |x Access control  |x Evaluation 
650 0 7 |a Betriebssystem  |0 (DE-588)4006216-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Internet  |0 (DE-588)4308416-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Leistungsbewertung  |0 (DE-588)4167271-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Kommunikationsprotokoll  |0 (DE-588)4128252-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Server  |0 (DE-588)4209324-7  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)4398750-3  |a Checkliste  |2 gnd-content 
689 0 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 1 |a Kommunikationsprotokoll  |0 (DE-588)4128252-8  |D s 
689 0 2 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 3 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 4 |a Leistungsbewertung  |0 (DE-588)4167271-9  |D s 
689 0 |5 DE-604 
689 1 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 1 1 |a Betriebssystem  |0 (DE-588)4006216-8  |D s 
689 1 2 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 1 3 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 1 4 |a Leistungsbewertung  |0 (DE-588)4167271-9  |D s 
689 1 |5 DE-604 
689 2 0 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 2 1 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 2 2 |a Leistungsbewertung  |0 (DE-588)4167271-9  |D s 
689 2 3 |a Server  |0 (DE-588)4209324-7  |D s 
689 2 4 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 2 5 |a Internet  |0 (DE-588)4308416-3  |D s 
689 2 |8 1\p  |5 DE-604 
689 3 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 3 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 3 2 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 3 3 |a Leistungsbewertung  |0 (DE-588)4167271-9  |D s 
689 3 |5 DE-604 
856 4 2 |m HBZ Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012887835&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-012887835 

Datensatz im Suchindex

_version_ 1819726459674034176
adam_text Titel: Network security assessment Autor: McNab, Chris Jahr: 2004 Table of Contents Foreword................................................................ix Preface ................................................................xiii 1. Network Security Assessment........................................ 1 The Business Benefits 1 IP: The Foundation of the Internet 2 Classifying Internet-Based Attackers 3 Assessment Service Definitions 3 Network Security Assessment Methodology 4 The Cyclic Assessment Approach 7 2. The Tools Required.................................................. 9 The Operating Systems 9 Free Network Scanning Tools 11 Commercial Network Scanning Tools 12 Protocol-Dependent Assessment Tools 13 3. Internet Host and Network Enumeration .............................17 Web Search Engines 17 NIC Querying 21 DNS Querying 25 Enumeration Technique Recap 34 Enumeration Countermeasures 35 4. IP Network Scanning...............................................36 ICMP Probing 36 TCP Port Scanning 42 UDP Port Scanning IDS Evasion and Filter Circumvention -------- 56 Low-Level IP Assessment ^5 Network Scanning Recap 71 Network Scanning Countermeasures 72 5. Assessing Remote Information Services .............................. 73 Remote Information Services 73 systat and netstat 73 DNS 75 finger 8^ auth 84 SNMP ¦ ¦; ...........85 LDAP 90 rwho 92 RPC rusers 93 Remote Information Services Countermeasures 93 6. Assessing Web Services............................................. 95 Web Services 95 Identifying the Web Service 96 Identifying Subsystems and Components 105 Investigating Web Service Vulnerabilities 111 Accessing Poorly Protected Information 139 Assessing CGI Scripts and Custom ASP Pages 140 Web Services Countermeasures 153 7. Assessing Remote Maintenance Services ............................155 Remote Maintenance Services 155 SSH 156 Telnet 163 R-Services 170 X Windows 174 Microsoft Remote Desktop Protocol 178 VNC 180 Citrix 182 Remote Maintenance Services Countermeasures 185 vi | Table of Contents 8. Assessing FTP and Database Services................................186 FTP 186 FTP Banner Grabbing and Enumeration 187 FTP Brute-Force Password Guessing 191 FTP Bounce Attacks 191 Circumventing Stateful Filters Using FTP 193 FTP Process Manipulation Attacks 196 FTP Services Countermeasures 201 Database Services 202 Microsoft SQL Server 202 Oracle 206 MySQL 212 Database Services Countermeasures 214 9. Assessing Windows Networking Services ............................215 Microsoft Windows Networking Services 215 Microsoft RPC Services 216 The NetBIOS Name Service 230 The NetBIOS Datagram Service 232 The NetBIOS Session Service 233 The CIFS Service 241 Unix Samba Vulnerabilities 244 Windows Networking Services Countermeasures 245 10. Assessing Email Services...........................................247 Email Service Protocols 247 SMTP 247 POP-2 and POP-3 256 IMAP 258 Email Services Countermeasures 260 11. Assessing IP VPN Services..........................................261 IPsecVPNs 261 Attacking IPsec VPNs 263 Check Point VPN Security Issues 268 Microsoft PPTP 271 VPN Services Countermeasures 272 Table of Contents | vii 12. Assessing Unix RPC Services........................................ 773 Enumerating Unix RPC Services RPC Service Vulnerabilities 275 Unix RPC Services Countermeasures 282 13. Application-Level Risks............................................284 The Fundamental Hacking Concept 28^ The Reasons Why Software Is Vulnerable 285 Network Service Vulnerabilities and Attacks 286 Classic Buffer-Overflow Vulnerabilities 2^0 Heap Overflows 301 Integer Overflows 308 Format String Bugs 311 Memory Manipulation Attacks Recap 317 Mitigating Process Manipulation Risks 318 Recommended Secure Development Reading 321 14. Example Assessment Methodology .................................322 Network Scanning 322 Accessible Network Service Identification 328 Investigation of Known Vulnerabilities 334 Network Service Testing 338 Methodology Flow Diagram 343 Recommendations 343 Closing Comments 347 A. TCP, UDP Ports, and ICMP Message Types.............................349 TCP Ports 349 UDP Ports 352 ICMP Message Types 352 B. Sources of Vulnerability Information................................354 Security Mailing Lists 354 Vulnerability Databases and Lists 354 Underground Web Sites 355 Security Events and Conferences 355 Index........................................................................357 viii | Table of Contents
any_adam_object 1
author McNab, Chris 1980-
author_GND (DE-588)131828967
author_facet McNab, Chris 1980-
author_role aut
author_sort McNab, Chris 1980-
author_variant c m cm
building Verbundindex
bvnumber BV019426705
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
classification_rvk ST 200
ctrlnum (OCoLC)442364843
(DE-599)BVBBV019426705
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition 1. ed.
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03609nam a2200853 c 4500</leader><controlfield tag="001">BV019426705</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170222 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">041015s2004 xx |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">969911483</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">059600611X</subfield><subfield code="c">Kt. : EUR 38.00 (freier Pr.)</subfield><subfield code="9">0-596-00611-X</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780596006112</subfield></datafield><datafield tag="024" ind1="1" ind2=" "><subfield code="a">636920006114</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)442364843</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019426705</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="080" ind1=" " ind2=" "><subfield code="a">004.7</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">McNab, Chris</subfield><subfield code="d">1980-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)131828967</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security assessment</subfield><subfield code="c">Chris McNab</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 371 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet - Server - Computersicherheit - Datensicherung - Leistungsbewertung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - Betriebssystem - Computersicherheit - Datensicherung - Leistungsbewertung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - Computersicherheit - Datensicherung - Leistungsbewertung - Checkliste</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - Kommunikationsprotokoll - Computersicherheit - Datensicherung - Leistungsbewertung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Server</subfield><subfield code="0">(DE-588)4209324-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4398750-3</subfield><subfield code="a">Checkliste</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Server</subfield><subfield code="0">(DE-588)4209324-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="5"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Leistungsbewertung</subfield><subfield code="0">(DE-588)4167271-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=012887835&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-012887835</subfield></datafield></record></collection>
genre (DE-588)4398750-3 Checkliste gnd-content
genre_facet Checkliste
id DE-604.BV019426705
illustrated Not Illustrated
indexdate 2024-12-23T17:48:28Z
institution BVB
isbn 059600611X
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-012887835
oclc_num 442364843
open_access_boolean
owner DE-706
owner_facet DE-706
physical XXI, 371 S.
publishDate 2004
publishDateSearch 2004
publishDateSort 2004
publisher O'Reilly
record_format marc
spellingShingle McNab, Chris 1980-
Network security assessment
Internet - Server - Computersicherheit - Datensicherung - Leistungsbewertung
Rechnernetz - Betriebssystem - Computersicherheit - Datensicherung - Leistungsbewertung
Rechnernetz - Computersicherheit - Datensicherung - Leistungsbewertung - Checkliste
Rechnernetz - Kommunikationsprotokoll - Computersicherheit - Datensicherung - Leistungsbewertung
Computer networks Security measures Evaluation
Computers Access control Evaluation
Betriebssystem (DE-588)4006216-8 gnd
Rechnernetz (DE-588)4070085-9 gnd
Internet (DE-588)4308416-3 gnd
Datensicherung (DE-588)4011144-1 gnd
Leistungsbewertung (DE-588)4167271-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Kommunikationsprotokoll (DE-588)4128252-8 gnd
Server (DE-588)4209324-7 gnd
subject_GND (DE-588)4006216-8
(DE-588)4070085-9
(DE-588)4308416-3
(DE-588)4011144-1
(DE-588)4167271-9
(DE-588)4274324-2
(DE-588)4128252-8
(DE-588)4209324-7
(DE-588)4398750-3
title Network security assessment
title_auth Network security assessment
title_exact_search Network security assessment
title_full Network security assessment Chris McNab
title_fullStr Network security assessment Chris McNab
title_full_unstemmed Network security assessment Chris McNab
title_short Network security assessment
title_sort network security assessment
topic Internet - Server - Computersicherheit - Datensicherung - Leistungsbewertung
Rechnernetz - Betriebssystem - Computersicherheit - Datensicherung - Leistungsbewertung
Rechnernetz - Computersicherheit - Datensicherung - Leistungsbewertung - Checkliste
Rechnernetz - Kommunikationsprotokoll - Computersicherheit - Datensicherung - Leistungsbewertung
Computer networks Security measures Evaluation
Computers Access control Evaluation
Betriebssystem (DE-588)4006216-8 gnd
Rechnernetz (DE-588)4070085-9 gnd
Internet (DE-588)4308416-3 gnd
Datensicherung (DE-588)4011144-1 gnd
Leistungsbewertung (DE-588)4167271-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Kommunikationsprotokoll (DE-588)4128252-8 gnd
Server (DE-588)4209324-7 gnd
topic_facet Internet - Server - Computersicherheit - Datensicherung - Leistungsbewertung
Rechnernetz - Betriebssystem - Computersicherheit - Datensicherung - Leistungsbewertung
Rechnernetz - Computersicherheit - Datensicherung - Leistungsbewertung - Checkliste
Rechnernetz - Kommunikationsprotokoll - Computersicherheit - Datensicherung - Leistungsbewertung
Computer networks Security measures Evaluation
Computers Access control Evaluation
Betriebssystem
Rechnernetz
Internet
Datensicherung
Leistungsbewertung
Computersicherheit
Kommunikationsprotokoll
Server
Checkliste
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012887835&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT mcnabchris networksecurityassessment