Infosecurity 2008 threat analysis:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress Pub.
©2008
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes index An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions. * Provides IT Security Professionals with a first look at likely new threats to their enterprise * Includes real-world examples of system intrusions and compromised data * Provides techniques and strategies to detect, prevent, and recover * Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence |
Beschreibung: | 1 Online-Ressource (xxiv, 442 pages) |
ISBN: | 9781597492249 1597492248 9780080558691 0080558690 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305765 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2008 |||| o||u| ||||||eng d | ||
020 | |a 9781597492249 |9 978-1-59749-224-9 | ||
020 | |a 1597492248 |9 1-59749-224-8 | ||
020 | |a 9780080558691 |c electronic bk. |9 978-0-08-055869-1 | ||
020 | |a 0080558690 |c electronic bk. |9 0-08-055869-0 | ||
035 | |a (ZDB-33-EBS)ocn281598632 | ||
035 | |a (OCoLC)281598632 | ||
035 | |a (DE-599)BVBBV042305765 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Infosecurity 2008 threat analysis |c [authors, Champ Clark III [and others] ; foreword by Richard Ford |
246 | 1 | 3 | |a Threat analysis |
264 | 1 | |a Burlington, MA |b Syngress Pub. |c ©2008 | |
300 | |a 1 Online-Ressource (xxiv, 442 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions. * Provides IT Security Professionals with a first look at likely new threats to their enterprise * Includes real-world examples of system intrusions and compromised data * Provides techniques and strategies to detect, prevent, and recover * Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence | ||
650 | 4 | |a Database security. Computer security. Data protection. Computers / Access control. Telecommunication / Security measures | |
650 | 4 | |a Database security | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computers / Access control | |
650 | 4 | |a Telecommunication / Security measures | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Database security |2 fast | |
650 | 7 | |a Telecommunication / Security measures |2 fast | |
650 | 4 | |a Database security | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computers |x Access control | |
650 | 4 | |a Telecommunication |x Security measures | |
700 | 1 | |a Clark, Champ |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597492249 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027742757 |
Datensatz im Suchindex
_version_ | 1804152889254346752 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV042305765 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn281598632 (OCoLC)281598632 (DE-599)BVBBV042305765 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03427nmm a2200625zc 4500</leader><controlfield tag="001">BV042305765</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492249</subfield><subfield code="9">978-1-59749-224-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492248</subfield><subfield code="9">1-59749-224-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080558691</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055869-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080558690</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055869-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn281598632</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)281598632</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305765</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Infosecurity 2008 threat analysis</subfield><subfield code="c">[authors, Champ Clark III [and others] ; foreword by Richard Ford</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Threat analysis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">©2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiv, 442 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions. * Provides IT Security Professionals with a first look at likely new threats to their enterprise * Includes real-world examples of system intrusions and compromised data * Provides techniques and strategies to detect, prevent, and recover * Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security. Computer security. Data protection. Computers / Access control. Telecommunication / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Telecommunication / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Clark, Champ</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597492249</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742757</subfield></datafield></record></collection> |
id | DE-604.BV042305765 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:53Z |
institution | BVB |
isbn | 9781597492249 1597492248 9780080558691 0080558690 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742757 |
oclc_num | 281598632 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxiv, 442 pages) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Infosecurity 2008 threat analysis [authors, Champ Clark III [and others] ; foreword by Richard Ford Threat analysis Burlington, MA Syngress Pub. ©2008 1 Online-Ressource (xxiv, 442 pages) txt rdacontent c rdamedia cr rdacarrier Includes index An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions. * Provides IT Security Professionals with a first look at likely new threats to their enterprise * Includes real-world examples of system intrusions and compromised data * Provides techniques and strategies to detect, prevent, and recover * Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence Database security. Computer security. Data protection. Computers / Access control. Telecommunication / Security measures Database security Computer security Data protection Computers / Access control Telecommunication / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computers / Access control fast Data protection fast Database security fast Telecommunication / Security measures fast Computers Access control Telecommunication Security measures Clark, Champ Sonstige oth http://www.sciencedirect.com/science/book/9781597492249 Verlag Volltext |
spellingShingle | Infosecurity 2008 threat analysis Database security. Computer security. Data protection. Computers / Access control. Telecommunication / Security measures Database security Computer security Data protection Computers / Access control Telecommunication / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computers / Access control fast Data protection fast Database security fast Telecommunication / Security measures fast Computers Access control Telecommunication Security measures |
title | Infosecurity 2008 threat analysis |
title_alt | Threat analysis |
title_auth | Infosecurity 2008 threat analysis |
title_exact_search | Infosecurity 2008 threat analysis |
title_full | Infosecurity 2008 threat analysis [authors, Champ Clark III [and others] ; foreword by Richard Ford |
title_fullStr | Infosecurity 2008 threat analysis [authors, Champ Clark III [and others] ; foreword by Richard Ford |
title_full_unstemmed | Infosecurity 2008 threat analysis [authors, Champ Clark III [and others] ; foreword by Richard Ford |
title_short | Infosecurity 2008 threat analysis |
title_sort | infosecurity 2008 threat analysis |
topic | Database security. Computer security. Data protection. Computers / Access control. Telecommunication / Security measures Database security Computer security Data protection Computers / Access control Telecommunication / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computers / Access control fast Data protection fast Database security fast Telecommunication / Security measures fast Computers Access control Telecommunication Security measures |
topic_facet | Database security. Computer security. Data protection. Computers / Access control. Telecommunication / Security measures Database security Computer security Data protection Computers / Access control Telecommunication / Security measures COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computers Access control Telecommunication Security measures |
url | http://www.sciencedirect.com/science/book/9781597492249 |
work_keys_str_mv | AT clarkchamp infosecurity2008threatanalysis AT clarkchamp threatanalysis |