Stock Image

Network security technology and application of the ceremony genuine authentic](Chinese Edition)

GAO YONG QIANG GUO SHI ZE

ISBN 10: 7115110298 / ISBN 13: 9787115110299
New Condition: New Soft cover
From liu xing (JiangSu, JS, China)

AbeBooks Seller Since 07 April 2009 Seller Rating 5-star rating

Quantity Available: 1

Buy New
Price: 40.58 Convert Currency
Shipping: Free From China to U.S.A. Destination, rates & speeds
Add to basket

About this Item

Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date: 2003 Pages: 409 Publisher: People's Posts and Telecommunications Press sheet: 26.5 The book introduces hacker intrusion means and protective measures. Organizational structure is divided into three parts: Part 1 describes the means of hacking and network security are essential basics; Part 2 describes the system-level and network-level hacking and security issues for all levels; Part 3 Network security angle gives the specific implementation method. From a technical point of view. it comes to the platform of Windows. UNIX and UNIX-like systems. including scan from target detection. monitoring. remote control. bomb attacks. password cracking and various common attack methods.Four Satisfaction guaranteed,or money back. Bookseller Inventory # FX061845

Ask Seller a Question

Bibliographic Details

Title: Network security technology and application ...

Binding: paperback

Book Condition: New

About this title

Synopsis:

Paperback. Pub Date: 2003 Pages: 409 Publisher: People's Posts and Telecommunications Press sheet: 26.5 The book introduces hacker intrusion means and protective measures. Organizational structure is divided into three parts: Part 1 describes the means of hacking and network security are essential basics; Part 2 describes the system-level and network-level hacking and security issues for all levels; Part 3 Network security angle gives the specific implementation method. From a technical point of view. it comes to the platform of Windows. UNIX and UNIX-like systems. including scan from target detection. monitoring. remote control. bomb attacks. password cracking and various common attack methods.

"About this title" may belong to another edition of this title.

Store Description

Thank you for visiting My bookstore! We are an online bookstore, and Is the China's largest online book sales. Generally our books are from China, with reasonable price and decent printing quality. We are always trying our best to satisfy customer's needs!

Visit Seller's Storefront

Terms of Sale:

We guarantee the condition of every book as it's described on the Abebooks web sites. If you're dissatisfied with your purchase (Incorrect Book/Not as Described/Damaged) or if the order hasn't arrived, you're eligible for a refund within 30 days of the estimated delivery date. If you've changed your mind about a book that you've ordered, please use the Ask bookseller a question link to contact us and we'll respond within 2 business days. Please Note:We don't sell any international Edition to you...

More Information
Shipping Terms:

Most orders are shipped within 24 hours. We will delivery these items to you by AIRMAIL, EUB, EMS, TNT etc.

List this Seller's Books

Payment Methods
accepted by seller

Visa Mastercard American Express

PayPal Bank/Wire Transfer