Seven deadliest wireless technologies attacks:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress/Elsevier
c2010
|
Schriftenreihe: | Syngress seven deadliest attacks series
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xvi, 122 p.) |
ISBN: | 9781597495417 1597495417 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042300682 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781597495417 |9 978-1-59749-541-7 | ||
020 | |a 1597495417 |9 1-59749-541-7 | ||
035 | |a (ZDB-33-EBS)ocn613958928 | ||
035 | |a (OCoLC)613958928 | ||
035 | |a (DE-599)BVBBV042300682 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Haines, Brad |e Verfasser |4 aut | |
245 | 1 | 0 | |a Seven deadliest wireless technologies attacks |c Brad Haines ; technical editor, Tim Kramer |
264 | 1 | |a Burlington, MA |b Syngress/Elsevier |c c2010 | |
300 | |a 1 Online-Ressource (xvi, 122 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Syngress seven deadliest attacks series | |
500 | |a How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Réseaux d'ordinateurs | |
650 | 4 | |a Transmission sans fil | |
650 | 7 | |a Wireless communication systems / Security measures |2 local | |
650 | 7 | |a Computer networks / Security measures |2 local | |
650 | 7 | |a Computer security |2 local | |
650 | 4 | |a Wireless communication systems |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
653 | |a Electronic books | ||
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597495417 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027737674 |
Datensatz im Suchindex
_version_ | 1804152878369079296 |
---|---|
any_adam_object | |
author | Haines, Brad |
author_facet | Haines, Brad |
author_role | aut |
author_sort | Haines, Brad |
author_variant | b h bh |
building | Verbundindex |
bvnumber | BV042300682 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn613958928 (OCoLC)613958928 (DE-599)BVBBV042300682 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02566nmm a2200481zc 4500</leader><controlfield tag="001">BV042300682</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495417</subfield><subfield code="9">978-1-59749-541-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495417</subfield><subfield code="9">1-59749-541-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn613958928</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)613958928</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042300682</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Haines, Brad</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Seven deadliest wireless technologies attacks</subfield><subfield code="c">Brad Haines ; technical editor, Tim Kramer</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress/Elsevier</subfield><subfield code="c">c2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 122 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Syngress seven deadliest attacks series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Transmission sans fil</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495417</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027737674</subfield></datafield></record></collection> |
id | DE-604.BV042300682 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:42Z |
institution | BVB |
isbn | 9781597495417 1597495417 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027737674 |
oclc_num | 613958928 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xvi, 122 p.) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Syngress/Elsevier |
record_format | marc |
series2 | Syngress seven deadliest attacks series |
spelling | Haines, Brad Verfasser aut Seven deadliest wireless technologies attacks Brad Haines ; technical editor, Tim Kramer Burlington, MA Syngress/Elsevier c2010 1 Online-Ressource (xvi, 122 p.) txt rdacontent c rdamedia cr rdacarrier Syngress seven deadliest attacks series How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable Includes bibliographical references and index Réseaux d'ordinateurs Transmission sans fil Wireless communication systems / Security measures local Computer networks / Security measures local Computer security local Wireless communication systems Security measures Computer networks Security measures Computer security Electronic books http://www.sciencedirect.com/science/book/9781597495417 Verlag Volltext |
spellingShingle | Haines, Brad Seven deadliest wireless technologies attacks Réseaux d'ordinateurs Transmission sans fil Wireless communication systems / Security measures local Computer networks / Security measures local Computer security local Wireless communication systems Security measures Computer networks Security measures Computer security |
title | Seven deadliest wireless technologies attacks |
title_auth | Seven deadliest wireless technologies attacks |
title_exact_search | Seven deadliest wireless technologies attacks |
title_full | Seven deadliest wireless technologies attacks Brad Haines ; technical editor, Tim Kramer |
title_fullStr | Seven deadliest wireless technologies attacks Brad Haines ; technical editor, Tim Kramer |
title_full_unstemmed | Seven deadliest wireless technologies attacks Brad Haines ; technical editor, Tim Kramer |
title_short | Seven deadliest wireless technologies attacks |
title_sort | seven deadliest wireless technologies attacks |
topic | Réseaux d'ordinateurs Transmission sans fil Wireless communication systems / Security measures local Computer networks / Security measures local Computer security local Wireless communication systems Security measures Computer networks Security measures Computer security |
topic_facet | Réseaux d'ordinateurs Transmission sans fil Wireless communication systems / Security measures Computer networks / Security measures Computer security Wireless communication systems Security measures Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781597495417 |
work_keys_str_mv | AT hainesbrad sevendeadliestwirelesstechnologiesattacks |