Combating spyware in the enterprise:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
2006
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate economy and network of malicious hackers and criminals An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention |
Beschreibung: | 1 Online-Ressource (xx, 386 p.) |
ISBN: | 0080502229 1429416580 1597490644 9780080502229 9781429416580 9781597490641 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043044490 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151123s2006 |||| o||u| ||||||eng d | ||
020 | |a 0080502229 |9 0-08-050222-9 | ||
020 | |a 1429416580 |c electronic bk. |9 1-4294-1658-0 | ||
020 | |a 1597490644 |9 1-59749-064-4 | ||
020 | |a 1597490644 |9 1-59749-064-4 | ||
020 | |a 9780080502229 |9 978-0-08-050222-9 | ||
020 | |a 9780080502229 |9 978-0-08-050222-9 | ||
020 | |a 9781429416580 |c electronic bk. |9 978-1-4294-1658-0 | ||
020 | |a 9781597490641 |9 978-1-59749-064-1 | ||
035 | |a (OCoLC)560262751 | ||
035 | |a (DE-599)BVBBV043044490 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Combating spyware in the enterprise |c Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor |
246 | 1 | 3 | |a Spyware in the enterprise |
264 | 1 | |a Rockland, MA |b Syngress |c 2006 | |
300 | |a 1 Online-Ressource (xx, 386 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate economy and network of malicious hackers and criminals | ||
500 | |a An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Spyware (Computer software) |2 local | |
650 | 7 | |a Computer security |2 local | |
650 | 4 | |a Computer security | |
650 | 4 | |a Spyware (Computer software) | |
700 | 1 | |a Baskin, Brian |e Sonstige |4 oth | |
700 | 1 | |a Piltzecker, Tony |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028469027 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175410353668096 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043044490 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)560262751 (DE-599)BVBBV043044490 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02788nmm a2200541zc 4500</leader><controlfield tag="001">BV043044490</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080502229</subfield><subfield code="9">0-08-050222-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429416580</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4294-1658-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490644</subfield><subfield code="9">1-59749-064-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490644</subfield><subfield code="9">1-59749-064-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080502229</subfield><subfield code="9">978-0-08-050222-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080502229</subfield><subfield code="9">978-0-08-050222-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429416580</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4294-1658-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490641</subfield><subfield code="9">978-1-59749-064-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)560262751</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043044490</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Combating spyware in the enterprise</subfield><subfield code="c">Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Spyware in the enterprise</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 386 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate economy and network of malicious hackers and criminals</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Spyware (Computer software)</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Spyware (Computer software)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baskin, Brian</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Piltzecker, Tony</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028469027</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043044490 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:51Z |
institution | BVB |
isbn | 0080502229 1429416580 1597490644 9780080502229 9781429416580 9781597490641 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028469027 |
oclc_num | 560262751 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xx, 386 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress |
record_format | marc |
spelling | Combating spyware in the enterprise Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor Spyware in the enterprise Rockland, MA Syngress 2006 1 Online-Ressource (xx, 386 p.) txt rdacontent c rdamedia cr rdacarrier Includes index Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate economy and network of malicious hackers and criminals An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Spyware (Computer software) local Computer security local Computer security Spyware (Computer software) Baskin, Brian Sonstige oth Piltzecker, Tony Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423 Aggregator Volltext |
spellingShingle | Combating spyware in the enterprise COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Spyware (Computer software) local Computer security local Computer security Spyware (Computer software) |
title | Combating spyware in the enterprise |
title_alt | Spyware in the enterprise |
title_auth | Combating spyware in the enterprise |
title_exact_search | Combating spyware in the enterprise |
title_full | Combating spyware in the enterprise Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor |
title_fullStr | Combating spyware in the enterprise Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor |
title_full_unstemmed | Combating spyware in the enterprise Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor |
title_short | Combating spyware in the enterprise |
title_sort | combating spyware in the enterprise |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Spyware (Computer software) local Computer security local Computer security Spyware (Computer software) |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Spyware (Computer software) Computer security |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423 |
work_keys_str_mv | AT baskinbrian combatingspywareintheenterprise AT piltzeckertony combatingspywareintheenterprise AT baskinbrian spywareintheenterprise AT piltzeckertony spywareintheenterprise |