Botnets: the killer web app
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
© 2007
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes index The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets. * This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise * Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself |
Beschreibung: | 1 Online-Ressource (xv, 464 pages) |
ISBN: | 9781597491358 1597491357 0080500234 9780080500232 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314175 | ||
003 | DE-604 | ||
005 | 20200204 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2007 |||| o||u| ||||||eng d | ||
020 | |a 9781597491358 |9 978-1-59749-135-8 | ||
020 | |a 1597491357 |9 1-59749-135-7 | ||
020 | |a 0080500234 |9 0-08-050023-4 | ||
020 | |a 9780080500232 |9 978-0-08-050023-2 | ||
035 | |a (ZDB-33-EBS)ocn162131556 | ||
035 | |a (OCoLC)162131556 | ||
035 | |a (DE-599)BVBBV042314175 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-634 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Schiller, Craig A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Botnets |b the killer web app |c Craig A. Schiller [and others] |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c © 2007 | |
300 | |a 1 Online-Ressource (xv, 464 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets. * This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise * Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Web sites |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597491358 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
940 | 1 | |q BTU_PDA_EBS_Kauf | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027751166 |
Datensatz im Suchindex
_version_ | 1804152907053924352 |
---|---|
any_adam_object | |
author | Schiller, Craig A. |
author_facet | Schiller, Craig A. |
author_role | aut |
author_sort | Schiller, Craig A. |
author_variant | c a s ca cas |
building | Verbundindex |
bvnumber | BV042314175 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn162131556 (OCoLC)162131556 (DE-599)BVBBV042314175 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02457nmm a2200469zc 4500</leader><controlfield tag="001">BV042314175</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200204 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491358</subfield><subfield code="9">978-1-59749-135-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491357</subfield><subfield code="9">1-59749-135-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080500234</subfield><subfield code="9">0-08-050023-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080500232</subfield><subfield code="9">978-0-08-050023-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn162131556</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162131556</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314175</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schiller, Craig A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Botnets</subfield><subfield code="b">the killer web app</subfield><subfield code="c">Craig A. Schiller [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">© 2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 464 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets. * This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise * Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597491358</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">BTU_PDA_EBS_Kauf</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751166</subfield></datafield></record></collection> |
id | DE-604.BV042314175 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9781597491358 1597491357 0080500234 9780080500232 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751166 |
oclc_num | 162131556 |
open_access_boolean | |
owner | DE-1046 DE-634 |
owner_facet | DE-1046 DE-634 |
physical | 1 Online-Ressource (xv, 464 pages) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD BTU_PDA_EBS_Kauf |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Schiller, Craig A. Verfasser aut Botnets the killer web app Craig A. Schiller [and others] Rockland, MA Syngress Pub. © 2007 1 Online-Ressource (xv, 464 pages) txt rdacontent c rdamedia cr rdacarrier Includes index The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets. * This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise * Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself Computer networks Security measures Web sites Security measures Computer security Malware (DE-588)4687059-3 gnd rswk-swf Malware (DE-588)4687059-3 s DE-604 http://www.sciencedirect.com/science/book/9781597491358 Verlag Volltext |
spellingShingle | Schiller, Craig A. Botnets the killer web app Computer networks Security measures Web sites Security measures Computer security Malware (DE-588)4687059-3 gnd |
subject_GND | (DE-588)4687059-3 |
title | Botnets the killer web app |
title_auth | Botnets the killer web app |
title_exact_search | Botnets the killer web app |
title_full | Botnets the killer web app Craig A. Schiller [and others] |
title_fullStr | Botnets the killer web app Craig A. Schiller [and others] |
title_full_unstemmed | Botnets the killer web app Craig A. Schiller [and others] |
title_short | Botnets |
title_sort | botnets the killer web app |
title_sub | the killer web app |
topic | Computer networks Security measures Web sites Security measures Computer security Malware (DE-588)4687059-3 gnd |
topic_facet | Computer networks Security measures Web sites Security measures Computer security Malware |
url | http://www.sciencedirect.com/science/book/9781597491358 |
work_keys_str_mv | AT schillercraiga botnetsthekillerwebapp |