Aggressive network self-defense:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
©2005
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Are you tired of feeling vulnerable to the latest security vulnerabilities? Are you fed up with vendors who take too long to release security patches, while criminals waste no time in exploiting those very same holes? Do you want to know who, exactly, is really trying to hack your network? Do you think EVERYONE should be responsible for securing their owns systems so they can't be used to attack yours? Do you think you have the right to defend yourself, your network, and ultimately your business against aggressors and adversaries? If so, Aggressive Network Self-Defense is the book for you. Le Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough |
Beschreibung: | 1 Online-Ressource (xxx, 383 pages) |
ISBN: | 0080488293 1597490296 1931836205 9780080488295 9781597490290 9781931836203 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043135097 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2005 |||| o||u| ||||||eng d | ||
020 | |a 0080488293 |c electronic bk. |9 0-08-048829-3 | ||
020 | |a 1597490296 |c electronic bk. |9 1-59749-029-6 | ||
020 | |a 1931836205 |9 1-931836-20-5 | ||
020 | |a 9780080488295 |c electronic bk. |9 978-0-08-048829-5 | ||
020 | |a 9781597490290 |c electronic bk. |9 978-1-59749-029-0 | ||
020 | |a 9781931836203 |9 978-1-931836-20-3 | ||
035 | |a (OCoLC)70735885 | ||
035 | |a (DE-599)BVBBV043135097 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Wyler, Neil R. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Aggressive network self-defense |c Neil R. Wyler |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c ©2005 | |
300 | |a 1 Online-Ressource (xxx, 383 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Are you tired of feeling vulnerable to the latest security vulnerabilities? Are you fed up with vendors who take too long to release security patches, while criminals waste no time in exploiting those very same holes? Do you want to know who, exactly, is really trying to hack your network? Do you think EVERYONE should be responsible for securing their owns systems so they can't be used to attack yours? Do you think you have the right to defend yourself, your network, and ultimately your business against aggressors and adversaries? If so, Aggressive Network Self-Defense is the book for you. Le | ||
500 | |a Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet / Security measures | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Dot Net Enterprise Services |0 (DE-588)4712760-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a SQL Server 2000 |0 (DE-588)4623337-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a SQL Server 2000 |0 (DE-588)4623337-4 |D s |
689 | 0 | 1 | |a Dot Net Enterprise Services |0 (DE-588)4712760-0 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=249359 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028559288 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=249359 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=249359 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175578285211648 |
---|---|
any_adam_object | |
author | Wyler, Neil R. |
author_facet | Wyler, Neil R. |
author_role | aut |
author_sort | Wyler, Neil R. |
author_variant | n r w nr nrw |
building | Verbundindex |
bvnumber | BV043135097 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)70735885 (DE-599)BVBBV043135097 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03491nmm a2200589zc 4500</leader><controlfield tag="001">BV043135097</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080488293</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-048829-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490296</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-029-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836205</subfield><subfield code="9">1-931836-20-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080488295</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-048829-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490290</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-029-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836203</subfield><subfield code="9">978-1-931836-20-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70735885</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043135097</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wyler, Neil R.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Aggressive network self-defense</subfield><subfield code="c">Neil R. Wyler</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">©2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxx, 383 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Are you tired of feeling vulnerable to the latest security vulnerabilities? Are you fed up with vendors who take too long to release security patches, while criminals waste no time in exploiting those very same holes? Do you want to know who, exactly, is really trying to hack your network? Do you think EVERYONE should be responsible for securing their owns systems so they can't be used to attack yours? Do you think you have the right to defend yourself, your network, and ultimately your business against aggressors and adversaries? If so, Aggressive Network Self-Defense is the book for you. Le</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Dot Net Enterprise Services</subfield><subfield code="0">(DE-588)4712760-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">SQL Server 2000</subfield><subfield code="0">(DE-588)4623337-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">SQL Server 2000</subfield><subfield code="0">(DE-588)4623337-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Dot Net Enterprise Services</subfield><subfield code="0">(DE-588)4712760-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=249359</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028559288</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=249359</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=249359</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043135097 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:31Z |
institution | BVB |
isbn | 0080488293 1597490296 1931836205 9780080488295 9781597490290 9781931836203 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028559288 |
oclc_num | 70735885 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxx, 383 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Wyler, Neil R. Verfasser aut Aggressive network self-defense Neil R. Wyler Rockland, MA Syngress Pub. ©2005 1 Online-Ressource (xxx, 383 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Are you tired of feeling vulnerable to the latest security vulnerabilities? Are you fed up with vendors who take too long to release security patches, while criminals waste no time in exploiting those very same holes? Do you want to know who, exactly, is really trying to hack your network? Do you think EVERYONE should be responsible for securing their owns systems so they can't be used to attack yours? Do you think you have the right to defend yourself, your network, and ultimately your business against aggressors and adversaries? If so, Aggressive Network Self-Defense is the book for you. Le Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough Computer networks / Security measures Computer security Internet / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Internet / Security measures fast Internet Security measures Dot Net Enterprise Services (DE-588)4712760-0 gnd rswk-swf SQL Server 2000 (DE-588)4623337-4 gnd rswk-swf SQL Server 2000 (DE-588)4623337-4 s Dot Net Enterprise Services (DE-588)4712760-0 s DE-604 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=249359 Aggregator Volltext |
spellingShingle | Wyler, Neil R. Aggressive network self-defense Computer networks / Security measures Computer security Internet / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Internet / Security measures fast Internet Security measures Dot Net Enterprise Services (DE-588)4712760-0 gnd SQL Server 2000 (DE-588)4623337-4 gnd |
subject_GND | (DE-588)4712760-0 (DE-588)4623337-4 |
title | Aggressive network self-defense |
title_auth | Aggressive network self-defense |
title_exact_search | Aggressive network self-defense |
title_full | Aggressive network self-defense Neil R. Wyler |
title_fullStr | Aggressive network self-defense Neil R. Wyler |
title_full_unstemmed | Aggressive network self-defense Neil R. Wyler |
title_short | Aggressive network self-defense |
title_sort | aggressive network self defense |
topic | Computer networks / Security measures Computer security Internet / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Internet / Security measures fast Internet Security measures Dot Net Enterprise Services (DE-588)4712760-0 gnd SQL Server 2000 (DE-588)4623337-4 gnd |
topic_facet | Computer networks / Security measures Computer security Internet / Security measures COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Internet Security measures Dot Net Enterprise Services SQL Server 2000 |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=249359 |
work_keys_str_mv | AT wylerneilr aggressivenetworkselfdefense |