Applied information security: a hands-on approach
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XIV, 202 S. graph. Darst. |
ISBN: | 9783642244735 3642244734 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV039741135 | ||
003 | DE-604 | ||
005 | 20120208 | ||
007 | t | ||
008 | 111205s2011 d||| |||| 00||| eng d | ||
015 | |a 11,N38 |2 dnb | ||
015 | |a 11,A49 |2 dnb | ||
016 | 7 | |a 1015274935 |2 DE-101 | |
020 | |a 9783642244735 |c Pp. : EUR 32.05 (DE) (freier Pr.), ca. EUR 33.00 (AT) (freier Pr.), ca. sfr 40.00 (freier Pr.) |9 978-3-642-24473-5 | ||
020 | |a 3642244734 |9 3-642-24473-4 | ||
024 | 3 | |a 9783642244735 | |
028 | 5 | 2 | |a Best.-Nr.: 80114099 |
035 | |a (OCoLC)844948411 | ||
035 | |a (DE-599)DNB1015274935 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-634 |a DE-11 |a DE-29T |a DE-526 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Basin, David |e Verfasser |4 aut | |
245 | 1 | 0 | |a Applied information security |b a hands-on approach |c David Basin ; Patrick Schaller ; Michael Schläpfer |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a XIV, 202 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Virtuelle Maschine |0 (DE-588)4188396-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Logdatei |0 (DE-588)4381064-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betriebssystem |0 (DE-588)4006216-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikoanalyse |0 (DE-588)4137042-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 0 | 2 | |a Virtuelle Maschine |0 (DE-588)4188396-2 |D s |
689 | 0 | 3 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 4 | |a Betriebssystem |0 (DE-588)4006216-8 |D s |
689 | 0 | 5 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | 1 | |a Logdatei |0 (DE-588)4381064-0 |D s |
689 | 1 | 2 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 1 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 4 | |a Risikoanalyse |0 (DE-588)4137042-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Schaller, Patrick |e Verfasser |4 aut | |
700 | 1 | |a Schläpfer, Michael |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Applied Information Security |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3882006&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024588806&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024588806 |
Datensatz im Suchindex
_version_ | 1805145681750392832 |
---|---|
adam_text |
IMAGE 1
CONTENTS
SECURITY PRINCIPLES 1
1.1 OBJECTIVES 1
1.2 PROBLEM CONTEXT 1
1.3 THE PRINCIPLES 2
1.3.1 SIMPLICITY 3
1.3.2 OPEN DESIGN 3
1.3.3 COMPARTMENTALIZATION 4
1.3.4 MINIMUM EXPOSURE 5
1.3.5 LEAST PRIVILEGE 6
1.3.6 MINIMUM TRUST AND MAXIMUM TRUSTWORTHINESS 7 1.3.7 SECURE,
FAIL-SAFE DEFAULTS 9
1.3.8 COMPLETE MEDIATION 10
1.3.9 NO SINGLE POINT OF FAILURE 11
1.3.10 TRACEABILITY 12
1.3.11 GENERATING SECRETS 13
1.3.12 USABILITY 13
1.4 DISCUSSION 14
1.5 ASSIGNMENT 14
1.6 EXERCISES 14
THE VIRTUAL ENVIRONMENT 17
2.1 OBJECTIVES 17
2.2 VIRTUALBOX 18
2.2.1 SETTING UP A NEW VIRTUAL MACHINE 18
2.2.2 THE NETWORK 19
2.3 THE LAB ENVIRONMENT 21
2.3.1 THE HOSTS 22
2.4 INSTALLING THE VIRTUAL MACHINES 24
2.4.1 INSTALLING HOST A L I CE 24
2.4.2 INSTALLING HOST BOB 25
2.4.3 INSTALLINGHOSTMALLET 26
XI
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1015274935
DIGITALISIERT DURCH
IMAGE 2
CONTENTS
NETWORK SERVICES 27
3.1 OBJECTIVES 27
3.2 NETWORKING BACKGROUND 28
3.2.1 INTERNET LAYER 29
3.2.2 TRANSPORT LAYER 29
3.3 THE ADVERSARY'S POINT OF VIEW 31
3.3.1 INFORMATION GATHERING 31
3.3.2 FINDING POTENTIAL VULNERABILITIES 33
3.3.3 EXPLOITING VULNERABILITIES 35
3.3.4 VULNERABLE CONFIGURATIONS 36
3.4 THE ADMINISTRATOR'S POINT OF VIEW 38
3.5 ACTIONS TO BE TAKEN 39
3.5.1 DEACTIVATING SERVICES 39
3.5.2 RESTRICTING SERVICES 42
3.6 EXERCISES 45
AUTHENTICATION AND ACCESS CONTROL 47
4. 1 OBJECTIVES 47
4.2 AUTHENTICATION 47
4.2.1 TELNET AND REMOTE SHELL 48
4.2.2 SECURE SHELL 49
4.3 USER IDS AND PERMISSIONS 52
4.3.1 FILE ACCESS PERMISSIONS 52
4.3.2 SETUID AND SETGID 55
4.4 SHELL SCRIPT SECURITY 57
4.4.1 SYMBOLIC LINKS 58
4.4.2 TEMPORARY FILES 59
4.4.3 ENVIRONMENT 60
4.4.4 DATA VALIDATION 61
4.5 QUOTAS 62
4.6 CHANGE ROOT 63
4.7 EXERCISES 66
LOGGING AND LOG ANALYSIS 69
5.1 OBJECTIVES 69
5.2 LOGGING MECHANISMS AND LOG FILES 70
5.2.1 REMOTE LOGGING 72
5.3 PROBLEMS WITH LOGGING 72
5.3.1 TAMPERING AND AUTHENTICITY 72
5.3.2 TAMPER-PROOF LOGGING 73
5.3.3 INPUT VALIDATION 73
5.3.4 ROTATION 74
5.4 INTRUSION DETECTION 74
5.4.1 LOG ANALYSIS 75
5.4.2 SUSPICIOUS FILES AND ROOTKITS 76
IMAGE 3
CONTENTS
5.4.3 INTEGRITY CHECKS 77
5.5 EXERCISES 79
WEB APPLICATION SECURITY 81
6.1 OBJECTIVES 81
6.2 PREPARATORY WORK 82
6.3 BLACK-BOX AUDIT 82
6.4 ATTACKING WEB APPLICATIONS 84
6.4.1 REMOTE FILE UPLOAD VULNERABILITY IN JOOMLA! 84 6.4.2 REMOTE
COMMAND EXECUTION 85
6.4.3 SQL INJECTIONS 86
6.4.4 PRIVILEGE ESCALATION 88
6.5 USER AUTHENTICATION AND SESSION MANAGEMENT 89
6.5.1 A PHP-BASED AUTHENTICATION MECHANISM 89
6.5.2 HTTP BASIC AUTHENTICATION 90
6.5.3 COOKIE-BASED SESSION MANAGEMENT 92
6.6 CROSS-SITE SCRIPTING (XSS) 94
6.6.1 PERSISTENT XSS ATTACKS 94
6.6.2 REFLECTED XSS ATTACKS 95
6.6.3 DOM-BASED XSS ATTACKS 96
6.7 SQL INJECTIONS REVISITED 97
6.8 SECURE SOCKET LAYER 98
6.9 FURTHER READING 100
6.10 EXERCISES 100
CERTIFICATES AND PUBLIC KEY CRYPTOGRAPHY 103
7.1 OBJECTIVES 103
7.2 FUNDAMENTALS OF PUBLIC KEY CRYPTOGRAPHY 103
7.3 DISTRIBUTION OF PUBLIC KEYS AND CERTIFICATES 105
7.4 CREATING KEYS AND CERTIFICATES 107
7.5 RUNNING A CERTIFICATE AUTHORITY 108
7.6 CERTIFICATE-BASED CLIENT AUTHENTICATION I LL
7.7 EXERCISES 112
RISK MANAGEMENT 117
8.1 OBJECTIVES 117
8.2 RISK AND RISK MANAGEMENT 117
8.3 THE CORE ELEMENTS OF RISK ANALYSIS 120
8.4 RISK ANALYSIS: AN IMPLEMENTATION 129
8.4.1 SYSTEM DESCRIPTION 130
8.4.2 STAKEHOLDERS 132
8.4.3 ASSETS AND VULNERABILITIES 132
8.4.4 VULNERABILITIES 137
8.4.5 THREAT SOURCES 138
8.4.6 RISKS AND COUNTERMEASURES 139
IMAGE 4
XIV CONTENTS
8.4.7 SUMMARY 144
A USING THIS BOOK IN A LAB COURSE 147
A. 1 COURSE STRUCTURE 147
A.2 PROJECT 148
B REPORT TEMPLATE 155
B.I SYSTEM CHARACTERIZATION 155
B. 1.1 SYSTEM OVERVIEW 155
B.1.2 SYSTEM FUNCTIONALITY 155
B.I.3 COMPONENTS AND SUBSYSTEMS 156
B.1.4 INTERFACES 156
B.1.5 BACKDOORS 156
B.1.6 ADDITIONAL MATERIAL 156
B.2 RISK ANALYSIS AND SECURITY MEASURES 156
B.2.1 INFORMATION ASSETS 156
B.2.2 THREAT SOURCES 156
B.2.3 RISKS AND COUNTERMEASURES 157
B.3 REVIEW OF THE EXTERNAL SYSTEM 158
B.3.1 BACKGROUND 158
B.3.2 COMPLETENESS IN TERMS OF FUNCTIONALITY 158
B.3.3 ARCHITECTURE AND SECURITY CONCEPTS 158
B.3.4 IMPLEMENTATION 158
B.3.5 BACKDOORS 159
B.3.6 COMPARISON 159
C LINUX BASICS AND TOOLS 161
C.I SYSTEM DOCUMENTATION 161
C.2 TOOLS 163
C.2.1 VARIABLES 163
C.2.2 QUOTING AND WILDCARDS 164
C.2.3 PIPELINING AND BACKQUOTES 164
C.2.4 I S, F I ND AND L O C A TE 165
C.2.5 WE, S O R T, U N I Q, H E AD AND T A IL 165
C.2.6 P S, P G R E P, K I LL AND K I L L A LL 165
C.2.7 G R EP 166
C.2.8 AWK AND S ED 167
C.2.9 TCPDUMP 168
D ANSWERS TO QUESTIONS 169
REFERENCES 197
INDEX 199 |
any_adam_object | 1 |
author | Basin, David Schaller, Patrick Schläpfer, Michael |
author_facet | Basin, David Schaller, Patrick Schläpfer, Michael |
author_role | aut aut aut |
author_sort | Basin, David |
author_variant | d b db p s ps m s ms |
building | Verbundindex |
bvnumber | BV039741135 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)844948411 (DE-599)DNB1015274935 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV039741135</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120208</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">111205s2011 d||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N38</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,A49</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1015274935</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642244735</subfield><subfield code="c">Pp. : EUR 32.05 (DE) (freier Pr.), ca. EUR 33.00 (AT) (freier Pr.), ca. sfr 40.00 (freier Pr.)</subfield><subfield code="9">978-3-642-24473-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642244734</subfield><subfield code="9">3-642-24473-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642244735</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80114099</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)844948411</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1015274935</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-526</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Basin, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied information security</subfield><subfield code="b">a hands-on approach</subfield><subfield code="c">David Basin ; Patrick Schaller ; Michael Schläpfer</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 202 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Virtuelle Maschine</subfield><subfield code="0">(DE-588)4188396-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Logdatei</subfield><subfield code="0">(DE-588)4381064-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Virtuelle Maschine</subfield><subfield code="0">(DE-588)4188396-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Logdatei</subfield><subfield code="0">(DE-588)4381064-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schaller, Patrick</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schläpfer, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Applied Information Security</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3882006&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024588806&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024588806</subfield></datafield></record></collection> |
id | DE-604.BV039741135 |
illustrated | Illustrated |
indexdate | 2024-07-21T00:17:52Z |
institution | BVB |
isbn | 9783642244735 3642244734 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024588806 |
oclc_num | 844948411 |
open_access_boolean | |
owner | DE-706 DE-634 DE-11 DE-29T DE-526 |
owner_facet | DE-706 DE-634 DE-11 DE-29T DE-526 |
physical | XIV, 202 S. graph. Darst. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
spelling | Basin, David Verfasser aut Applied information security a hands-on approach David Basin ; Patrick Schaller ; Michael Schläpfer Berlin [u.a.] Springer 2011 XIV, 202 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Virtuelle Maschine (DE-588)4188396-2 gnd rswk-swf Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Logdatei (DE-588)4381064-0 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf Betriebssystem (DE-588)4006216-8 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Risikoanalyse (DE-588)4137042-9 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Softwareschwachstelle (DE-588)4752508-3 s Virtuelle Maschine (DE-588)4188396-2 s Rechnernetz (DE-588)4070085-9 s Betriebssystem (DE-588)4006216-8 s Anwendungssystem (DE-588)4139375-2 s DE-604 Zugriffskontrolle (DE-588)4293034-0 s Logdatei (DE-588)4381064-0 s Public-Key-Kryptosystem (DE-588)4209133-0 s Kryptoanalyse (DE-588)4830502-9 s Risikoanalyse (DE-588)4137042-9 s Schaller, Patrick Verfasser aut Schläpfer, Michael Verfasser aut Erscheint auch als Online-Ausgabe Applied Information Security X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3882006&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024588806&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Basin, David Schaller, Patrick Schläpfer, Michael Applied information security a hands-on approach Virtuelle Maschine (DE-588)4188396-2 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Logdatei (DE-588)4381064-0 gnd Computersicherheit (DE-588)4274324-2 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd Betriebssystem (DE-588)4006216-8 gnd Rechnernetz (DE-588)4070085-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Risikoanalyse (DE-588)4137042-9 gnd Anwendungssystem (DE-588)4139375-2 gnd |
subject_GND | (DE-588)4188396-2 (DE-588)4752508-3 (DE-588)4830502-9 (DE-588)4381064-0 (DE-588)4274324-2 (DE-588)4209133-0 (DE-588)4006216-8 (DE-588)4070085-9 (DE-588)4293034-0 (DE-588)4137042-9 (DE-588)4139375-2 |
title | Applied information security a hands-on approach |
title_auth | Applied information security a hands-on approach |
title_exact_search | Applied information security a hands-on approach |
title_full | Applied information security a hands-on approach David Basin ; Patrick Schaller ; Michael Schläpfer |
title_fullStr | Applied information security a hands-on approach David Basin ; Patrick Schaller ; Michael Schläpfer |
title_full_unstemmed | Applied information security a hands-on approach David Basin ; Patrick Schaller ; Michael Schläpfer |
title_short | Applied information security |
title_sort | applied information security a hands on approach |
title_sub | a hands-on approach |
topic | Virtuelle Maschine (DE-588)4188396-2 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Logdatei (DE-588)4381064-0 gnd Computersicherheit (DE-588)4274324-2 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd Betriebssystem (DE-588)4006216-8 gnd Rechnernetz (DE-588)4070085-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Risikoanalyse (DE-588)4137042-9 gnd Anwendungssystem (DE-588)4139375-2 gnd |
topic_facet | Virtuelle Maschine Softwareschwachstelle Kryptoanalyse Logdatei Computersicherheit Public-Key-Kryptosystem Betriebssystem Rechnernetz Zugriffskontrolle Risikoanalyse Anwendungssystem |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3882006&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024588806&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT basindavid appliedinformationsecurityahandsonapproach AT schallerpatrick appliedinformationsecurityahandsonapproach AT schlapfermichael appliedinformationsecurityahandsonapproach |