<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>02719nam a2200337 a 4500</leader>
  <controlfield tag="001">TVCDKTCT9984</controlfield>
  <controlfield tag="003">Thư viện trường Cao đẳng Kỹ thuật Cao Thắng</controlfield>
  <controlfield tag="005">20080805000000</controlfield>
  <controlfield tag="008">080805</controlfield>
  <datafield tag="980" ind1="\" ind2="\">
   <subfield code="a">Thư viện Trường CĐ Kỹ Thuật Cao Thắng</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
   <subfield code="a">RG_1 #1 eb0 i1</subfield>
  </datafield>
  <datafield tag="020" ind1="#" ind2="#">
   <subfield code="a">0072230614</subfield>
  </datafield>
  <datafield tag="041" ind1="0" ind2="#">
   <subfield code="a">vie</subfield>
  </datafield>
  <datafield tag="082" ind1="#" ind2="#">
   <subfield code="a">005 / </subfield>
   <subfield code="b">H100C-j</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2="#">
   <subfield code="a">Scambray Joel</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
   <subfield code="a">Windows Server 2003 (Hacking Exposed) /</subfield>
   <subfield code="c">Scambray Joel, McClure Stuart</subfield>
  </datafield>
  <datafield tag="260" ind1="#" ind2="#">
   <subfield code="a">American :</subfield>
   <subfield code="b">MC Graw Hill ,</subfield>
   <subfield code="c">2006</subfield>
  </datafield>
  <datafield tag="300" ind1="#" ind2="#">
   <subfield code="a">628tr.</subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">&quot;The most demystifying source of information since Toto exposed the Wizard. Hacking Exposed Windows Server 2003 eliminates the mystique and levels the playing field by revealing the science behind the curtain.&quot; --Greg Wood, General Manager, Information Security, Microsoft Corporation</subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">From the best-selling co-authors of the world-renowned book, Hacking Exposed, comes Hacking Exposed Windows Server 2003. You’ll learn, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks and weaknesses. All the new security features and exploits in Windows Server 2003 are covered. </subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">From the Back Cover</subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">&quot;The end-all of hacking.... A must-read if you want to secure your networks.&quot; --W2Knews</subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">Plug the holes in your Windows infrastructure by seeing it through the eyes of the attacker</subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">Protect your Windows Server 2003 systems from the latest widespread and devastating attacks the tried-and-true Hacking Exposed way. You'll learn, step-by-step, how intruders locate targets, gain super-user access, and ransack compromised networks. Fully updated chapters detail all-new Windows Server 2003 footprinting and scanning methods, IIS6 security flaws, buffer overflow exploits, Terminal Services hacks, and DoS/DDoS vulnerabilities. Real-world cases and code examples demonstrate the most current dangers and spell out countermeasures to stonewall malicious intruders every time.</subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">New and Updated Material:</subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">All-new Windows footprinting and scanning tools and techniques </subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">NetBIOS, MSRPC, SMB, DNS, SNMP, and Active Directory enumeration protection </subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">Updated exploits of Windows-specific services, including the MSRPC interface vulnerability that led to the Blaster worm, SQL Slammer, and eavesdropping attacks on Kerberos </subfield>
  </datafield>
  <datafield tag="520" ind1="#" ind2="#">
   <subfield code="a">Details on the new IIS6 security architecture, URLScan, Microsoft Web services source code disclosure exploits, and HTR chunked encoding exploits </subfield>
  </datafield>
  <datafield tag="650" ind1="#" ind2="4">
   <subfield code="a">Windows Server 2003</subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2="#">
   <subfield code="a">McClure Stuart</subfield>
  </datafield>
 </record>
</collection>
