Items related to Network security technology and application of the...

Network security technology and application of the ceremony genuine authentic](Chinese Edition) - Softcover

 
9787115110299: Network security technology and application of the ceremony genuine authentic](Chinese Edition)
View all copies of this ISBN edition:
 
 
Paperback. Pub Date: 2003 Pages: 409 Publisher: People's Posts and Telecommunications Press sheet: 26.5 The book introduces hacker intrusion means and protective measures. Organizational structure is divided into three parts: Part 1 describes the means of hacking and network security are essential basics; Part 2 describes the system-level and network-level hacking and security issues for all levels; Part 3 Network security angle gives the specific implementation method. From a technical point of view. it comes to the platform of Windows. UNIX and UNIX-like systems. including scan from target detection. monitoring. remote control. bomb attacks. password cracking and various common attack methods.

"synopsis" may belong to another edition of this title.

Shipping: £ 12.05
From China to U.S.A.

Destination, rates & speeds

Add to Basket

Top Search Results from the AbeBooks Marketplace

Stock Image

GAO YONG QIANG GUO SHI ZE
ISBN 10: 7115110298 ISBN 13: 9787115110299
New paperback Quantity: 1
Seller:
liu xing
(Nanjing JiangSu, JS, China)

Book Description paperback. Condition: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date: 2003 Pages: 409 Publisher: People's Posts and Telecommunications Press sheet: 26.5 The book introduces hacker intrusion means and protective measures. Organizational structure is divided into three parts: Part 1 describes the means of hacking and network security are essential basics; Part 2 describes the system-level and network-level hacking and security issues for all levels; Part 3 Network security angle gives the specific implementation method. From a technical point of view. it comes to the platform of Windows. UNIX and UNIX-like systems. including scan from target detection. monitoring. remote control. bomb attacks. password cracking and various common attack methods.Four Satisfaction guaranteed,or money back. Seller Inventory # FX061845

More information about this seller | Contact seller

Buy New
£ 42.62
Convert currency

Add to Basket

Shipping: £ 12.05
From China to U.S.A.
Destination, rates & speeds