000 | 01292mm aa2200361a 44500 | ||
---|---|---|---|
003 | AR-sfUTN | ||
005 | 20190626195730.0 | ||
006 | m|||||q|||||00| 0 | ||
007 | co na man|| | ||
008 | 190624| xag|||||q|||||00| 0 spa d | ||
040 | _cAR-sfUTN | ||
020 | _a0-321-10895-7 | ||
041 | _aeng | ||
044 | _cUS | ||
080 | _a(0.034.4)004.056 SP49 | ||
100 | _aSpitzner, Lance | ||
245 | _aHoneypots: tracking hackers | ||
260 |
_aBoston: _bAddison-Wesley, _c2003 |
||
300 |
_a1 CD-ROM, 5 1/4 pl. _b287 MB |
||
336 | _aDatos y programas electrónicos | ||
337 | _aComputadora | ||
338 | _aDisco de computadora | ||
385 | _aSecurity professional | ||
500 | _aAcompaña al texto, nº inv. 8723 | ||
505 | _aA CD-ROM accompanies the book (Honeypots: tracking hackers) and contains additional information related to the topics in the book. It includes everything from whitepapers and source code to actual evaluation copies of software and data captures of real attacks. This will give you the hands-on opportunity to develop your skills with honeypot technologies. | ||
538 | _aWindows.- Unix | ||
650 | _aCOMPUTER SECURITY | ||
650 | _aCOMPUTER HACKERS | ||
650 | _aFIREWALLS | ||
650 | _aHONEYPOTS | ||
650 | _aSEGURIDAD INFORMATICA | ||
942 | _cCF | ||
999 |
_c18098 _d18098 |