Aggressive network self-defense /:
Are you tired of feeling vulnerable to the latest security vulnerabilities? Are you fed up with vendors who take too long to release security patches, while criminals waste no time in exploiting those very same holes? Do you want to know who, exactly, is really trying to hack your network? Do you th...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress Pub.,
©2005.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Are you tired of feeling vulnerable to the latest security vulnerabilities? Are you fed up with vendors who take too long to release security patches, while criminals waste no time in exploiting those very same holes? Do you want to know who, exactly, is really trying to hack your network? Do you think EVERYONE should be responsible for securing their owns systems so they can't be used to attack yours? Do you think you have the right to defend yourself, your network, and ultimately your business against aggressors and adversaries? If so, Aggressive Network Self-Defense is the book for you. Le. |
Beschreibung: | 1 online resource (xxx, 383 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1597490296 9781597490290 0080488293 9780080488295 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm70735885 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 040112s2005 maua ob o001 0 eng d | ||
040 | |a REDDC |b eng |e pn |c REDDC |d OCLCQ |d NTG |d WPG |d EBLCP |d YDXCP |d CDN |d OCLCQ |d DKDLA |d ZCU |d MERUC |d CCO |d E7B |d IDEBK |d DEBBG |d OCLCQ |d N$T |d OPELS |d FVL |d CSU |d B24X7 |d OCLCQ |d UMI |d DEBSZ |d OCLCQ |d OCLCO |d OCLCF |d OCLCQ |d OCLCO |d AU@ |d OCLCO |d OCLCQ |d OCLCO |d COO |d OCLCO |d OCLCQ |d OCLCO |d AZK |d OCLCO |d LOA |d AGLDB |d COCUF |d CNNOR |d MOR |d PIFBR |d LIV |d OCLCQ |d OCLCA |d STF |d BRL |d WRM |d D6H |d VTS |d CEF |d NRAMU |d INT |d VT2 |d OCLCQ |d CBU |d A6Q |d OCLCQ |d LEAUB |d UKCRE |d UKAHL |d EYM |d OCLCO |d OCLCQ |d COA |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
019 | |a 61348674 |a 122927713 |a 162721189 |a 276461392 |a 475444391 |a 475649226 |a 506854026 |a 559228237 |a 646729444 |a 722342773 |a 728025355 |a 765142520 |a 780935157 |a 823828873 |a 823898597 |a 824089884 |a 824136604 |a 824152084 |a 856952341 |a 888701886 |a 961548758 |a 962563600 |a 966196506 |a 988522530 |a 991951102 |a 1035694276 |a 1037437367 |a 1037780974 |a 1038591228 |a 1045492583 |a 1055356685 |a 1076325617 |a 1081183301 |a 1152973455 |a 1153524028 |a 1192347232 |a 1194800099 |a 1228613575 |a 1240534105 |a 1340052586 | ||
020 | |a 1597490296 |q (electronic bk.) | ||
020 | |a 9781597490290 |q (electronic bk.) | ||
020 | |a 0080488293 |q (electronic bk.) | ||
020 | |a 9780080488295 |q (electronic bk.) | ||
020 | |z 1931836205 | ||
020 | |z 9781931836203 | ||
024 | 1 | |a 792502362051 | |
024 | 8 | |a (WaSeSS)ssj0000276735 | |
035 | |a (OCoLC)70735885 |z (OCoLC)61348674 |z (OCoLC)122927713 |z (OCoLC)162721189 |z (OCoLC)276461392 |z (OCoLC)475444391 |z (OCoLC)475649226 |z (OCoLC)506854026 |z (OCoLC)559228237 |z (OCoLC)646729444 |z (OCoLC)722342773 |z (OCoLC)728025355 |z (OCoLC)765142520 |z (OCoLC)780935157 |z (OCoLC)823828873 |z (OCoLC)823898597 |z (OCoLC)824089884 |z (OCoLC)824136604 |z (OCoLC)824152084 |z (OCoLC)856952341 |z (OCoLC)888701886 |z (OCoLC)961548758 |z (OCoLC)962563600 |z (OCoLC)966196506 |z (OCoLC)988522530 |z (OCoLC)991951102 |z (OCoLC)1035694276 |z (OCoLC)1037437367 |z (OCoLC)1037780974 |z (OCoLC)1038591228 |z (OCoLC)1045492583 |z (OCoLC)1055356685 |z (OCoLC)1076325617 |z (OCoLC)1081183301 |z (OCoLC)1152973455 |z (OCoLC)1153524028 |z (OCoLC)1192347232 |z (OCoLC)1194800099 |z (OCoLC)1228613575 |z (OCoLC)1240534105 |z (OCoLC)1340052586 | ||
050 | 4 | |a QA76.9.A25 |b W95 2005eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Wyler, Neil R. | |
245 | 1 | 0 | |a Aggressive network self-defense / |c Neil R. Wyler. |
260 | |a Rockland, MA : |b Syngress Pub., |c ©2005. | ||
300 | |a 1 online resource (xxx, 383 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
504 | |a Includes bibliographical references and index. | ||
520 | |a Are you tired of feeling vulnerable to the latest security vulnerabilities? Are you fed up with vendors who take too long to release security patches, while criminals waste no time in exploiting those very same holes? Do you want to know who, exactly, is really trying to hack your network? Do you think EVERYONE should be responsible for securing their owns systems so they can't be used to attack yours? Do you think you have the right to defend yourself, your network, and ultimately your business against aggressors and adversaries? If so, Aggressive Network Self-Defense is the book for you. Le. | ||
505 | 0 | |a Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough. | |
588 | 0 | |a Print version record. | |
650 | 0 | |a Internet |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Internet |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
653 | |a Andre fag (naturvidenskab og teknik) |a Andre fag | ||
758 | |i has work: |a Aggressive network self-defense [recurso electrónico] $c (Text) |1 https://id.oclc.org/worldcat/entity/E39PD3T9PFmJQxBT7M3gCYYYxC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Wyler, Neil R. |t Aggressive network self-defense. |d Rockland, MA : Syngress Pub., ©2005 |z 9781931836203 |w (OCoLC)58566416 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781931836203 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249359 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH23083872 | ||
938 | |a Books 24x7 |b B247 |n bks00004481 | ||
938 | |a ebrary |b EBRY |n ebr10075669 | ||
938 | |a EBSCOhost |b EBSC |n 249359 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 103580 | ||
938 | |a YBP Library Services |b YANK |n 2594453 | ||
938 | |a YBP Library Services |b YANK |n 2828006 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm70735885 |
---|---|
_version_ | 1816881638276071424 |
adam_text | |
any_adam_object | |
author | Wyler, Neil R. |
author_facet | Wyler, Neil R. |
author_role | |
author_sort | Wyler, Neil R. |
author_variant | n r w nr nrw |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 W95 2005eb |
callnumber-search | QA76.9.A25 W95 2005eb |
callnumber-sort | QA 276.9 A25 W95 42005EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough. |
ctrlnum | (OCoLC)70735885 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05560cam a2200733 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm70735885 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">040112s2005 maua ob o001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">REDDC</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">REDDC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NTG</subfield><subfield code="d">WPG</subfield><subfield code="d">EBLCP</subfield><subfield code="d">YDXCP</subfield><subfield code="d">CDN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKDLA</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">DEBBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OPELS</subfield><subfield code="d">FVL</subfield><subfield code="d">CSU</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UMI</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AZK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">LOA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">COCUF</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">NRAMU</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CBU</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">UKCRE</subfield><subfield code="d">UKAHL</subfield><subfield code="d">EYM</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">61348674</subfield><subfield code="a">122927713</subfield><subfield code="a">162721189</subfield><subfield code="a">276461392</subfield><subfield code="a">475444391</subfield><subfield code="a">475649226</subfield><subfield code="a">506854026</subfield><subfield code="a">559228237</subfield><subfield code="a">646729444</subfield><subfield code="a">722342773</subfield><subfield code="a">728025355</subfield><subfield code="a">765142520</subfield><subfield code="a">780935157</subfield><subfield code="a">823828873</subfield><subfield code="a">823898597</subfield><subfield code="a">824089884</subfield><subfield code="a">824136604</subfield><subfield code="a">824152084</subfield><subfield code="a">856952341</subfield><subfield code="a">888701886</subfield><subfield code="a">961548758</subfield><subfield code="a">962563600</subfield><subfield code="a">966196506</subfield><subfield code="a">988522530</subfield><subfield code="a">991951102</subfield><subfield code="a">1035694276</subfield><subfield code="a">1037437367</subfield><subfield code="a">1037780974</subfield><subfield code="a">1038591228</subfield><subfield code="a">1045492583</subfield><subfield code="a">1055356685</subfield><subfield code="a">1076325617</subfield><subfield code="a">1081183301</subfield><subfield code="a">1152973455</subfield><subfield code="a">1153524028</subfield><subfield code="a">1192347232</subfield><subfield code="a">1194800099</subfield><subfield code="a">1228613575</subfield><subfield code="a">1240534105</subfield><subfield code="a">1340052586</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490296</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490290</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080488293</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080488295</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1931836205</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781931836203</subfield></datafield><datafield tag="024" ind1="1" ind2=" "><subfield code="a">792502362051</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">(WaSeSS)ssj0000276735</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70735885</subfield><subfield code="z">(OCoLC)61348674</subfield><subfield code="z">(OCoLC)122927713</subfield><subfield code="z">(OCoLC)162721189</subfield><subfield code="z">(OCoLC)276461392</subfield><subfield code="z">(OCoLC)475444391</subfield><subfield code="z">(OCoLC)475649226</subfield><subfield code="z">(OCoLC)506854026</subfield><subfield code="z">(OCoLC)559228237</subfield><subfield code="z">(OCoLC)646729444</subfield><subfield code="z">(OCoLC)722342773</subfield><subfield code="z">(OCoLC)728025355</subfield><subfield code="z">(OCoLC)765142520</subfield><subfield code="z">(OCoLC)780935157</subfield><subfield code="z">(OCoLC)823828873</subfield><subfield code="z">(OCoLC)823898597</subfield><subfield code="z">(OCoLC)824089884</subfield><subfield code="z">(OCoLC)824136604</subfield><subfield code="z">(OCoLC)824152084</subfield><subfield code="z">(OCoLC)856952341</subfield><subfield code="z">(OCoLC)888701886</subfield><subfield code="z">(OCoLC)961548758</subfield><subfield code="z">(OCoLC)962563600</subfield><subfield code="z">(OCoLC)966196506</subfield><subfield code="z">(OCoLC)988522530</subfield><subfield code="z">(OCoLC)991951102</subfield><subfield code="z">(OCoLC)1035694276</subfield><subfield code="z">(OCoLC)1037437367</subfield><subfield code="z">(OCoLC)1037780974</subfield><subfield code="z">(OCoLC)1038591228</subfield><subfield code="z">(OCoLC)1045492583</subfield><subfield code="z">(OCoLC)1055356685</subfield><subfield code="z">(OCoLC)1076325617</subfield><subfield code="z">(OCoLC)1081183301</subfield><subfield code="z">(OCoLC)1152973455</subfield><subfield code="z">(OCoLC)1153524028</subfield><subfield code="z">(OCoLC)1192347232</subfield><subfield code="z">(OCoLC)1194800099</subfield><subfield code="z">(OCoLC)1228613575</subfield><subfield code="z">(OCoLC)1240534105</subfield><subfield code="z">(OCoLC)1340052586</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">W95 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wyler, Neil R.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Aggressive network self-defense /</subfield><subfield code="c">Neil R. Wyler.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxx, 383 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Are you tired of feeling vulnerable to the latest security vulnerabilities? Are you fed up with vendors who take too long to release security patches, while criminals waste no time in exploiting those very same holes? Do you want to know who, exactly, is really trying to hack your network? Do you think EVERYONE should be responsible for securing their owns systems so they can't be used to attack yours? Do you think you have the right to defend yourself, your network, and ultimately your business against aggressors and adversaries? If so, Aggressive Network Self-Defense is the book for you. Le.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Andre fag (naturvidenskab og teknik)</subfield><subfield code="a">Andre fag</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Aggressive network self-defense [recurso electrónico] $c (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PD3T9PFmJQxBT7M3gCYYYxC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Wyler, Neil R.</subfield><subfield code="t">Aggressive network self-defense.</subfield><subfield code="d">Rockland, MA : Syngress Pub., ©2005</subfield><subfield code="z">9781931836203</subfield><subfield code="w">(OCoLC)58566416</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781931836203</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249359</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH23083872</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00004481</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10075669</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">249359</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">103580</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2594453</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2828006</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm70735885 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:54Z |
institution | BVB |
isbn | 1597490296 9781597490290 0080488293 9780080488295 |
language | English |
oclc_num | 70735885 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxx, 383 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Wyler, Neil R. Aggressive network self-defense / Neil R. Wyler. Rockland, MA : Syngress Pub., ©2005. 1 online resource (xxx, 383 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Includes bibliographical references and index. Are you tired of feeling vulnerable to the latest security vulnerabilities? Are you fed up with vendors who take too long to release security patches, while criminals waste no time in exploiting those very same holes? Do you want to know who, exactly, is really trying to hack your network? Do you think EVERYONE should be responsible for securing their owns systems so they can't be used to attack yours? Do you think you have the right to defend yourself, your network, and ultimately your business against aggressors and adversaries? If so, Aggressive Network Self-Defense is the book for you. Le. Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough. Print version record. Internet Security measures. Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Internet Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Internet Security measures fast Andre fag (naturvidenskab og teknik) Andre fag has work: Aggressive network self-defense [recurso electrónico] $c (Text) https://id.oclc.org/worldcat/entity/E39PD3T9PFmJQxBT7M3gCYYYxC https://id.oclc.org/worldcat/ontology/hasWork Print version: Wyler, Neil R. Aggressive network self-defense. Rockland, MA : Syngress Pub., ©2005 9781931836203 (OCoLC)58566416 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781931836203 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249359 Volltext |
spellingShingle | Wyler, Neil R. Aggressive network self-defense / Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough. Internet Security measures. Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Internet Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Internet Security measures fast |
subject_GND | https://id.nlm.nih.gov/mesh/D016494 |
title | Aggressive network self-defense / |
title_auth | Aggressive network self-defense / |
title_exact_search | Aggressive network self-defense / |
title_full | Aggressive network self-defense / Neil R. Wyler. |
title_fullStr | Aggressive network self-defense / Neil R. Wyler. |
title_full_unstemmed | Aggressive network self-defense / Neil R. Wyler. |
title_short | Aggressive network self-defense / |
title_sort | aggressive network self defense |
topic | Internet Security measures. Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Internet Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Internet Security measures fast |
topic_facet | Internet Security measures. Computer security. Computer Security Internet Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security Internet Security measures |
url | https://www.sciencedirect.com/science/book/9781931836203 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249359 |
work_keys_str_mv | AT wylerneilr aggressivenetworkselfdefense |