Cyber security essentials:
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Forma...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
2011
|
Schriftenreihe: | An Auerbach book
|
Schlagworte: | |
Online-Zugang: | DE-863 DE-862 URL des Erstveröffentlichers |
Zusammenfassung: | "A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"-- |
Beschreibung: | 1 Online-Ressource (XV, 325 Seiten) Illustrationen, Diagramme |
ISBN: | 9781439851265 |
DOI: | 10.1201/b10485 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049920558 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 241023s2011 xx a||| o|||| 00||| eng d | ||
020 | |a 9781439851265 |c ebook, PDF |9 978-1-4398-5126-5 | ||
024 | 7 | |a 10.1201/b10485 |2 doi | |
035 | |a (OCoLC)1466911964 | ||
035 | |a (DE-599)BVBBV049920558 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-863 |a DE-862 | ||
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Cyber security essentials |c edited by James Graham, Richard Howard, Ryan Olson |
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c 2011 | |
300 | |a 1 Online-Ressource (XV, 325 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a An Auerbach book | |
520 | |a "A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"-- | ||
650 | 4 | |a Computer security | |
650 | 7 | |a BUSINESS & ECONOMICS / Management |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Wirtschaft | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Graham, James |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-4398-5123-9 |z 978-1-4398-5123-4 |
856 | 4 | 0 | |u https://doi.org/10.1201/b10485 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-7-TFC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035259148 | |
966 | e | |u https://doi.org/10.1201/b10485 |l DE-863 |p ZDB-7-TFC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1201/b10485 |l DE-862 |p ZDB-7-TFC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1819742336190513152 |
---|---|
adam_text | |
any_adam_object | |
building | Verbundindex |
bvnumber | BV049920558 |
classification_rvk | ST 276 |
collection | ZDB-7-TFC |
ctrlnum | (OCoLC)1466911964 (DE-599)BVBBV049920558 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1201/b10485 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049920558</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">241023s2011 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439851265</subfield><subfield code="c">ebook, PDF</subfield><subfield code="9">978-1-4398-5126-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/b10485</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1466911964</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049920558</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security essentials</subfield><subfield code="c">edited by James Graham, Richard Howard, Ryan Olson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XV, 325 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">An Auerbach book</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Graham, James</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-4398-5123-9</subfield><subfield code="z">978-1-4398-5123-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1201/b10485</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-7-TFC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035259148</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/b10485</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/b10485</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049920558 |
illustrated | Illustrated |
indexdate | 2024-12-29T04:05:28Z |
institution | BVB |
isbn | 9781439851265 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035259148 |
oclc_num | 1466911964 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
physical | 1 Online-Ressource (XV, 325 Seiten) Illustrationen, Diagramme |
psigel | ZDB-7-TFC |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | CRC Press |
record_format | marc |
series2 | An Auerbach book |
spellingShingle | Cyber security essentials Computer security BUSINESS & ECONOMICS / Management bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh Wirtschaft Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Cyber security essentials |
title_auth | Cyber security essentials |
title_exact_search | Cyber security essentials |
title_full | Cyber security essentials edited by James Graham, Richard Howard, Ryan Olson |
title_fullStr | Cyber security essentials edited by James Graham, Richard Howard, Ryan Olson |
title_full_unstemmed | Cyber security essentials edited by James Graham, Richard Howard, Ryan Olson |
title_short | Cyber security essentials |
title_sort | cyber security essentials |
topic | Computer security BUSINESS & ECONOMICS / Management bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh Wirtschaft Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer security BUSINESS & ECONOMICS / Management COMPUTERS / Information Technology COMPUTERS / Security / General Wirtschaft Computersicherheit |
url | https://doi.org/10.1201/b10485 |
work_keys_str_mv | AT grahamjames cybersecurityessentials |