The rootkit arsenal: escape and evasion in the dark corners of the system
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Plano, Tex.
Wordware Pub.
c2009
|
Schlagworte: | |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xxvii, 908 p. ill. 23 cm |
ISBN: | 9781598220612 1598220616 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV039122802 | ||
003 | DE-604 | ||
005 | 20110729 | ||
007 | t | ||
008 | 110706s2009 xxua||| |||| 00||| eng d | ||
010 | |a 2009008316 | ||
020 | |a 9781598220612 |c pbk. : alk. paper |9 978-1-598-22061-2 | ||
020 | |a 1598220616 |c pbk. : alk. paper |9 1-598-22061-6 | ||
035 | |a (OCoLC)698900932 | ||
035 | |a (DE-599)BVBBV039122802 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-Aug4 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Blunden, Bill |e Verfasser |4 aut | |
245 | 1 | 0 | |a The rootkit arsenal |b escape and evasion in the dark corners of the system |c Bill Blunden |
264 | 1 | |a Plano, Tex. |b Wordware Pub. |c c2009 | |
300 | |a xxvii, 908 p. |b ill. |c 23 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computers |x Access control | |
650 | 4 | |a Computer viruses | |
650 | 4 | |a Computer hackers | |
650 | 0 | 7 | |a Rootkit |0 (DE-588)7518179-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Rootkit |0 (DE-588)7518179-4 |D s |
689 | 0 | |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-024141317 |
Datensatz im Suchindex
_version_ | 1804147954427101184 |
---|---|
any_adam_object | |
author | Blunden, Bill |
author_facet | Blunden, Bill |
author_role | aut |
author_sort | Blunden, Bill |
author_variant | b b bb |
building | Verbundindex |
bvnumber | BV039122802 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)698900932 (DE-599)BVBBV039122802 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01403nam a2200433zc 4500</leader><controlfield tag="001">BV039122802</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110729 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110706s2009 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2009008316</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781598220612</subfield><subfield code="c">pbk. : alk. paper</subfield><subfield code="9">978-1-598-22061-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1598220616</subfield><subfield code="c">pbk. : alk. paper</subfield><subfield code="9">1-598-22061-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)698900932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV039122802</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Blunden, Bill</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The rootkit arsenal</subfield><subfield code="b">escape and evasion in the dark corners of the system</subfield><subfield code="c">Bill Blunden</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Plano, Tex.</subfield><subfield code="b">Wordware Pub.</subfield><subfield code="c">c2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxvii, 908 p.</subfield><subfield code="b">ill.</subfield><subfield code="c">23 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rootkit</subfield><subfield code="0">(DE-588)7518179-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rootkit</subfield><subfield code="0">(DE-588)7518179-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024141317</subfield></datafield></record></collection> |
id | DE-604.BV039122802 |
illustrated | Illustrated |
indexdate | 2024-07-09T23:59:27Z |
institution | BVB |
isbn | 9781598220612 1598220616 |
language | English |
lccn | 2009008316 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024141317 |
oclc_num | 698900932 |
open_access_boolean | |
owner | DE-Aug4 |
owner_facet | DE-Aug4 |
physical | xxvii, 908 p. ill. 23 cm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Wordware Pub. |
record_format | marc |
spelling | Blunden, Bill Verfasser aut The rootkit arsenal escape and evasion in the dark corners of the system Bill Blunden Plano, Tex. Wordware Pub. c2009 xxvii, 908 p. ill. 23 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Computers Access control Computer viruses Computer hackers Rootkit (DE-588)7518179-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Rootkit (DE-588)7518179-4 s DE-604 |
spellingShingle | Blunden, Bill The rootkit arsenal escape and evasion in the dark corners of the system Computers Access control Computer viruses Computer hackers Rootkit (DE-588)7518179-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7518179-4 (DE-588)4274324-2 |
title | The rootkit arsenal escape and evasion in the dark corners of the system |
title_auth | The rootkit arsenal escape and evasion in the dark corners of the system |
title_exact_search | The rootkit arsenal escape and evasion in the dark corners of the system |
title_full | The rootkit arsenal escape and evasion in the dark corners of the system Bill Blunden |
title_fullStr | The rootkit arsenal escape and evasion in the dark corners of the system Bill Blunden |
title_full_unstemmed | The rootkit arsenal escape and evasion in the dark corners of the system Bill Blunden |
title_short | The rootkit arsenal |
title_sort | the rootkit arsenal escape and evasion in the dark corners of the system |
title_sub | escape and evasion in the dark corners of the system |
topic | Computers Access control Computer viruses Computer hackers Rootkit (DE-588)7518179-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computers Access control Computer viruses Computer hackers Rootkit Computersicherheit |
work_keys_str_mv | AT blundenbill therootkitarsenalescapeandevasioninthedarkcornersofthesystem |