Network attacks and exploitation: a framework
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, IN
Wiley
2015
|
Schlagworte: | |
Online-Zugang: | FHI01 FRO01 UBG01 Volltext |
Beschreibung: | Includes bibliographical references and index This book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. -- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781119183440 1119183448 9781118987087 111898708X 9781118987124 9781118987230 1118987233 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043397940 | ||
003 | DE-604 | ||
005 | 20170327 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2015 |||| o||u| ||||||eng d | ||
020 | |a 9781119183440 |c electronic bk |9 978-1-119-18344-0 | ||
020 | |a 1119183448 |c electronic bk |9 1-119-18344-8 | ||
020 | |a 9781118987087 |c electronic bk |9 978-1-118-98708-7 | ||
020 | |a 111898708X |c electronic bk |9 1-118-98708-X | ||
020 | |a 9781118987124 |9 978-1-118-98712-4 | ||
020 | |a 9781118987230 |9 978-1-118-98723-0 | ||
020 | |a 1118987233 |9 1-118-98723-3 | ||
024 | 7 | |a 10.1002/9781119183440 |2 doi | |
035 | |a (ZDB-35-WIC)ocn913742234 | ||
035 | |a (OCoLC)913742234 | ||
035 | |a (DE-599)BVBBV043397940 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-861 | ||
082 | 0 | |a 658.4/78 |2 23 | |
100 | 1 | |a Monte, Matthew |e Verfasser |4 aut | |
245 | 1 | 0 | |a Network attacks and exploitation |b a framework |c Matthew Monte |
246 | 1 | 3 | |a Network attacks & exploitation |
264 | 1 | |a Indianapolis, IN |b Wiley |c 2015 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a This book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. -- | ||
650 | 7 | |a BUSINESS & ECONOMICS / Industrial Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management Science |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Behavior |2 bisacsh | |
650 | 7 | |a Business enterprises / Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer crimes / Prevention |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Corporations / Security measures |2 fast | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Business enterprises / Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer crimes / Prevention | |
650 | 4 | |a Corporations / Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerk |0 (DE-588)4171529-9 |2 gnd |9 rswk-swf |
653 | |a Electronic books | ||
689 | 0 | 0 | |a Netzwerk |0 (DE-588)4171529-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183440 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028816524 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183440 |l FHI01 |p ZDB-35-WIC |q FHI_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183440 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183440 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175980675203072 |
---|---|
any_adam_object | |
author | Monte, Matthew |
author_facet | Monte, Matthew |
author_role | aut |
author_sort | Monte, Matthew |
author_variant | m m mm |
building | Verbundindex |
bvnumber | BV043397940 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocn913742234 (OCoLC)913742234 (DE-599)BVBBV043397940 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03676nmm a2200721zc 4500</leader><controlfield tag="001">BV043397940</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170327 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119183440</subfield><subfield code="c">electronic bk</subfield><subfield code="9">978-1-119-18344-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119183448</subfield><subfield code="c">electronic bk</subfield><subfield code="9">1-119-18344-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118987087</subfield><subfield code="c">electronic bk</subfield><subfield code="9">978-1-118-98708-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111898708X</subfield><subfield code="c">electronic bk</subfield><subfield code="9">1-118-98708-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118987124</subfield><subfield code="9">978-1-118-98712-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118987230</subfield><subfield code="9">978-1-118-98723-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118987233</subfield><subfield code="9">1-118-98723-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119183440</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn913742234</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)913742234</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043397940</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-861</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Monte, Matthew</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network attacks and exploitation</subfield><subfield code="b">a framework</subfield><subfield code="c">Matthew Monte</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Network attacks & exploitation</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. --</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Industrial Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Behavior</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Corporations / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Corporations / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183440</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028816524</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183440</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHI_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183440</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183440</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043397940 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:54Z |
institution | BVB |
isbn | 9781119183440 1119183448 9781118987087 111898708X 9781118987124 9781118987230 1118987233 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028816524 |
oclc_num | 913742234 |
open_access_boolean | |
owner | DE-573 DE-861 |
owner_facet | DE-573 DE-861 |
physical | 1 Online-Ressource |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FHI_PDA_WIC_Kauf ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Wiley |
record_format | marc |
spelling | Monte, Matthew Verfasser aut Network attacks and exploitation a framework Matthew Monte Network attacks & exploitation Indianapolis, IN Wiley 2015 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index This book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. -- BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Business enterprises / Computer networks / Security measures fast Computer crimes / Prevention fast Computer security fast Corporations / Security measures fast Unternehmen Wirtschaft Business enterprises / Computer networks / Security measures Computer security Computer crimes / Prevention Corporations / Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Netzwerk (DE-588)4171529-9 gnd rswk-swf Electronic books Netzwerk (DE-588)4171529-9 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183440 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Monte, Matthew Network attacks and exploitation a framework BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Business enterprises / Computer networks / Security measures fast Computer crimes / Prevention fast Computer security fast Corporations / Security measures fast Unternehmen Wirtschaft Business enterprises / Computer networks / Security measures Computer security Computer crimes / Prevention Corporations / Security measures Computersicherheit (DE-588)4274324-2 gnd Netzwerk (DE-588)4171529-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4171529-9 |
title | Network attacks and exploitation a framework |
title_alt | Network attacks & exploitation |
title_auth | Network attacks and exploitation a framework |
title_exact_search | Network attacks and exploitation a framework |
title_full | Network attacks and exploitation a framework Matthew Monte |
title_fullStr | Network attacks and exploitation a framework Matthew Monte |
title_full_unstemmed | Network attacks and exploitation a framework Matthew Monte |
title_short | Network attacks and exploitation |
title_sort | network attacks and exploitation a framework |
title_sub | a framework |
topic | BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Business enterprises / Computer networks / Security measures fast Computer crimes / Prevention fast Computer security fast Corporations / Security measures fast Unternehmen Wirtschaft Business enterprises / Computer networks / Security measures Computer security Computer crimes / Prevention Corporations / Security measures Computersicherheit (DE-588)4274324-2 gnd Netzwerk (DE-588)4171529-9 gnd |
topic_facet | BUSINESS & ECONOMICS / Industrial Management BUSINESS & ECONOMICS / Management BUSINESS & ECONOMICS / Management Science BUSINESS & ECONOMICS / Organizational Behavior Business enterprises / Computer networks / Security measures Computer crimes / Prevention Computer security Corporations / Security measures Unternehmen Wirtschaft Computersicherheit Netzwerk |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183440 |
work_keys_str_mv | AT montematthew networkattacksandexploitationaframework AT montematthew networkattacksexploitation |