Seven deadliest network attacks:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Syngress
©2010
|
Schriftenreihe: | Syngress seven deadliest attacks series
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xiv, 142 pages) |
ISBN: | 9781597495509 1597495506 9781597495493 1597495492 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042300685 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781597495509 |c electronic bk. |9 978-1-59749-550-9 | ||
020 | |a 1597495506 |c electronic bk. |9 1-59749-550-6 | ||
020 | |a 9781597495493 |9 978-1-59749-549-3 | ||
020 | |a 1597495492 |9 1-59749-549-2 | ||
035 | |a (OCoLC)613962609 | ||
035 | |a (DE-599)BVBBV042300685 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Prowell, Stacy J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Seven deadliest network attacks |c Stacy Prowell, Rob Kraus, Mike Borkin |
264 | 1 | |a Amsterdam |b Syngress |c ©2010 | |
300 | |a 1 Online-Ressource (xiv, 142 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Syngress seven deadliest attacks series | |
500 | |a Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Access control | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Security measures | |
650 | 4 | |a Computer science | |
650 | 4 | |a Engineering | |
650 | 4 | |a Electrical engineering | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Access control |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer networks |x Access control | |
700 | 1 | |a Kraus, Rob |e Sonstige |4 oth | |
700 | 1 | |a Borkin, Mike |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597495493 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027737677 |
Datensatz im Suchindex
_version_ | 1804152878373273600 |
---|---|
any_adam_object | |
author | Prowell, Stacy J. |
author_facet | Prowell, Stacy J. |
author_role | aut |
author_sort | Prowell, Stacy J. |
author_variant | s j p sj sjp |
building | Verbundindex |
bvnumber | BV042300685 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)613962609 (DE-599)BVBBV042300685 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02991nmm a2200589zc 4500</leader><controlfield tag="001">BV042300685</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495509</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-550-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495506</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-550-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495493</subfield><subfield code="9">978-1-59749-549-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495492</subfield><subfield code="9">1-59749-549-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)613962609</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042300685</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Prowell, Stacy J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Seven deadliest network attacks</subfield><subfield code="c">Stacy Prowell, Rob Kraus, Mike Borkin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Syngress</subfield><subfield code="c">©2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 142 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Syngress seven deadliest attacks series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kraus, Rob</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Borkin, Mike</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495493</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027737677</subfield></datafield></record></collection> |
id | DE-604.BV042300685 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:42Z |
institution | BVB |
isbn | 9781597495509 1597495506 9781597495493 1597495492 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027737677 |
oclc_num | 613962609 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xiv, 142 pages) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Syngress |
record_format | marc |
series2 | Syngress seven deadliest attacks series |
spelling | Prowell, Stacy J. Verfasser aut Seven deadliest network attacks Stacy Prowell, Rob Kraus, Mike Borkin Amsterdam Syngress ©2010 1 Online-Ressource (xiv, 142 pages) txt rdacontent c rdamedia cr rdacarrier Syngress seven deadliest attacks series Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable Includes bibliographical references and index Access control Computer networks Security measures Computer science Engineering Electrical engineering COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Access control fast Computer networks / Security measures fast Informatik Ingenieurwissenschaften Computer networks Security measures Computer networks Access control Kraus, Rob Sonstige oth Borkin, Mike Sonstige oth http://www.sciencedirect.com/science/book/9781597495493 Verlag Volltext |
spellingShingle | Prowell, Stacy J. Seven deadliest network attacks Access control Computer networks Security measures Computer science Engineering Electrical engineering COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Access control fast Computer networks / Security measures fast Informatik Ingenieurwissenschaften Computer networks Security measures Computer networks Access control |
title | Seven deadliest network attacks |
title_auth | Seven deadliest network attacks |
title_exact_search | Seven deadliest network attacks |
title_full | Seven deadliest network attacks Stacy Prowell, Rob Kraus, Mike Borkin |
title_fullStr | Seven deadliest network attacks Stacy Prowell, Rob Kraus, Mike Borkin |
title_full_unstemmed | Seven deadliest network attacks Stacy Prowell, Rob Kraus, Mike Borkin |
title_short | Seven deadliest network attacks |
title_sort | seven deadliest network attacks |
topic | Access control Computer networks Security measures Computer science Engineering Electrical engineering COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Access control fast Computer networks / Security measures fast Informatik Ingenieurwissenschaften Computer networks Security measures Computer networks Access control |
topic_facet | Access control Computer networks Security measures Computer science Engineering Electrical engineering COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Access control Computer networks / Security measures Informatik Ingenieurwissenschaften Computer networks Security measures Computer networks Access control |
url | http://www.sciencedirect.com/science/book/9781597495493 |
work_keys_str_mv | AT prowellstacyj sevendeadliestnetworkattacks AT krausrob sevendeadliestnetworkattacks AT borkinmike sevendeadliestnetworkattacks |