<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>01562nam a2200217Ia 4500</leader>
  <controlfield tag="001">CTU_139077</controlfield>
  <controlfield tag="008">210402s9999    xx            000 0 und d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="c">26.39</subfield>
  </datafield>
  <datafield tag="082" ind1=" " ind2=" ">
   <subfield code="a">005.8</subfield>
  </datafield>
  <datafield tag="082" ind1=" " ind2=" ">
   <subfield code="b">H118</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2="0">
   <subfield code="a">Hacker's challenge 2:</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2="0">
   <subfield code="b">Test your network security &amp; forensic skill</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2="0">
   <subfield code="c">Mike D. Schiffman,...[et all.]</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">California, USA</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="b">Mc GrawHill</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="c">2003</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">Do you have what it takes to keep hackers out of your network? This unique volume tests your computer forensics and response skills with 20 brand-new, real-life security incidents as told by top-tier security experts. In an entertaining and informative style, this book addresses key security topics, including Denial of Service, malicious code, Web application attacks, wireless technologies, insider and outsider attacks, and more. Each challenge unfolds like a chapter from a novel and includes details of the incident--how the break-in was detected, evidence, and background such as log files and network diagrams--and is followed by a series of questions for you to solve. In Part II, you'll find a detailed explanation of exactly what was happening in each incident and the answers to the questioned posed in Part I, along with prevention and mitigation techniques.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
   <subfield code="a">Tin tặc,Internet,Computer crimes,Computer hackers,Mạng Internet,Tội phạm tin học</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
   <subfield code="x">Security measures,Phương pháp an toàn</subfield>
  </datafield>
  <datafield tag="904" ind1=" " ind2=" ">
   <subfield code="i">Liễu</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
   <subfield code="a">Trung tâm Học liệu Trường Đại học Cần Thơ</subfield>
  </datafield>
 </record>
</collection>
