Syngress force emerging threat analysis :: from mischief to malicious /
A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrows Threats Today This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of I...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress Pub.,
©2006.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrows Threats Today This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the best of this years top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future. * From Practical VoIP Security, Thomas Porter, Ph. D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security. * From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents the latest information on phishing and spam. * From Combating Spyware in the Enterprise, Brian Baskin, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and removal of spyware. * Also from Combating Spyware in the Enterprise, About.coms security expert Tony Bradley covers the transformation of spyware. * From Inside the SPAM Cartel, Spammer-X shows how spam is created and why it works so well. * From Securing IM and P2P Applications for the Enterprise, Paul Piccard, former manager of Internet Security Systems' Global Threat Operations Center, covers Skype security. * Also from Securing IM and P2P Applications for the Enterprise, Craig Edwards, creator of the IRC security software IRC Defender, discusses global IRC security. * From RFID Security, Brad Renderman Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application attacks. * Also from RFID Security, Frank Thornton, owner of Blackthorn Systems and an expert in wireless networks, discusses management of RFID security. * From Hack the Stack, security expert Michael Gregg covers attacking the people layer. * Bonus coverage includes exclusive material on device driver attacks by Dave Maynor, Senior Researcher at SecureWorks. * The best of this year: Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats * Complete Coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more * Covers secure enterprise-wide deployment of hottest technologies including Voice Over IP, Pocket PCs, smart phones, and more. |
Beschreibung: | 1 online resource (xxx, 610 pages) : illustrations |
ISBN: | 9781597490566 1597490563 9781429458191 1429458194 9780080475592 0080475590 9781597491587 1597491586 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn162131403 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 070802s2006 maua o 001 0 eng d | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OPELS |d OCLCQ |d N$T |d YDXCP |d ZCU |d N15 |d E7B |d DKDLA |d B24X7 |d UMI |d OCLCO |d DEBSZ |d OCLCO |d OCLCQ |d OCLCO |d MUX |d TEU |d OCLCF |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d COO |d OCLCO |d OCLCQ |d OCLCO |d AGLDB |d OCLCQ |d JBG |d OCLCA |d D6H |d UAB |d OCLCQ |d VTS |d CEF |d STF |d LEAUB |d VT2 |d BRF |d EYM |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO | ||
019 | |a 86078759 |a 154664175 |a 181842670 |a 466943647 |a 507575455 |a 647612983 |a 765142696 |a 824876116 |a 856958657 |a 1060198137 |a 1153025206 |a 1179676182 |a 1194788699 | ||
020 | |a 9781597490566 | ||
020 | |a 1597490563 | ||
020 | |a 9781429458191 |q (electronic bk.) | ||
020 | |a 1429458194 |q (electronic bk.) | ||
020 | |a 9780080475592 | ||
020 | |a 0080475590 | ||
020 | |a 9781597491587 |q (electronic bk. ; |q Adobe Reader) | ||
020 | |a 1597491586 |q (electronic bk. ; |q Adobe Reader) | ||
035 | |a (OCoLC)162131403 |z (OCoLC)86078759 |z (OCoLC)154664175 |z (OCoLC)181842670 |z (OCoLC)466943647 |z (OCoLC)507575455 |z (OCoLC)647612983 |z (OCoLC)765142696 |z (OCoLC)824876116 |z (OCoLC)856958657 |z (OCoLC)1060198137 |z (OCoLC)1153025206 |z (OCoLC)1179676182 |z (OCoLC)1194788699 | ||
037 | |a 132624:132744 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a QA76.9.A25 |b S975 2006eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Syngress force emerging threat analysis : |b from mischief to malicious / |c David Maynor [and others]. |
246 | 3 | 0 | |a Emerging threat analysis |
246 | 1 | 4 | |a Syngress force 2006 emerging threat analysis : from mischief to malicious |
260 | |a Rockland, MA : |b Syngress Pub., |c ©2006. | ||
300 | |a 1 online resource (xxx, 610 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrows Threats Today This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the best of this years top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future. * From Practical VoIP Security, Thomas Porter, Ph. D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security. * From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents the latest information on phishing and spam. * From Combating Spyware in the Enterprise, Brian Baskin, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and removal of spyware. * Also from Combating Spyware in the Enterprise, About.coms security expert Tony Bradley covers the transformation of spyware. * From Inside the SPAM Cartel, Spammer-X shows how spam is created and why it works so well. * From Securing IM and P2P Applications for the Enterprise, Paul Piccard, former manager of Internet Security Systems' Global Threat Operations Center, covers Skype security. * Also from Securing IM and P2P Applications for the Enterprise, Craig Edwards, creator of the IRC security software IRC Defender, discusses global IRC security. * From RFID Security, Brad Renderman Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application attacks. * Also from RFID Security, Frank Thornton, owner of Blackthorn Systems and an expert in wireless networks, discusses management of RFID security. * From Hack the Stack, security expert Michael Gregg covers attacking the people layer. * Bonus coverage includes exclusive material on device driver attacks by Dave Maynor, Senior Researcher at SecureWorks. * The best of this year: Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats * Complete Coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more * Covers secure enterprise-wide deployment of hottest technologies including Voice Over IP, Pocket PCs, smart phones, and more. | ||
505 | 0 | |a Chapter 1: Analysis of Future Threat Levels Chapter 2: Pocket PCs and Smart Phones Chapter 3: Bots and Bot Networks Chapter 4: Malware Attacks Chapter 5: VoIP and SPIT Chapter 6: Compromising Security Software Chapter 7: Attacking and Defending Embedded Devices Chapter 8: DMA Attacks Chapter 9: Second-Tier and Seeded Landscape Attacks Chapter 10: How Vulnerable are SCADA Systems? | |
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
700 | 1 | |a Maynor, David. |1 https://id.oclc.org/worldcat/entity/E39PCjGJT8vxtqWMkWWb8qVRDq |0 http://id.loc.gov/authorities/names/no2007123414 | |
758 | |i has work: |a Syngress force emerging threat analysis (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG4vPjP9vwgq4MRypjXdFC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Syngress force emerging threat analysis. |d Rockland, MA : Syngress Pub., ©2006 |z 1597490563 |z 9781597490566 |w (OCoLC)76941056 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=174833 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597490566 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00014079 | ||
938 | |a ebrary |b EBRY |n ebr10150169 | ||
938 | |a EBSCOhost |b EBSC |n 174833 | ||
938 | |a YBP Library Services |b YANK |n 2537838 | ||
938 | |a YBP Library Services |b YANK |n 2585992 | ||
938 | |a YBP Library Services |b YANK |n 2712428 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn162131403 |
---|---|
_version_ | 1816881650919800832 |
adam_text | |
any_adam_object | |
author2 | Maynor, David |
author2_role | |
author2_variant | d m dm |
author_GND | http://id.loc.gov/authorities/names/no2007123414 |
author_facet | Maynor, David |
author_sort | Maynor, David |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 S975 2006eb |
callnumber-search | QA76.9.A25 S975 2006eb |
callnumber-sort | QA 276.9 A25 S975 42006EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Chapter 1: Analysis of Future Threat Levels Chapter 2: Pocket PCs and Smart Phones Chapter 3: Bots and Bot Networks Chapter 4: Malware Attacks Chapter 5: VoIP and SPIT Chapter 6: Compromising Security Software Chapter 7: Attacking and Defending Embedded Devices Chapter 8: DMA Attacks Chapter 9: Second-Tier and Seeded Landscape Attacks Chapter 10: How Vulnerable are SCADA Systems? |
ctrlnum | (OCoLC)162131403 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06662cam a2200733 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn162131403</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">070802s2006 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OPELS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">ZCU</subfield><subfield code="d">N15</subfield><subfield code="d">E7B</subfield><subfield code="d">DKDLA</subfield><subfield code="d">B24X7</subfield><subfield code="d">UMI</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">MUX</subfield><subfield code="d">TEU</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">D6H</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">STF</subfield><subfield code="d">LEAUB</subfield><subfield code="d">VT2</subfield><subfield code="d">BRF</subfield><subfield code="d">EYM</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">86078759</subfield><subfield code="a">154664175</subfield><subfield code="a">181842670</subfield><subfield code="a">466943647</subfield><subfield code="a">507575455</subfield><subfield code="a">647612983</subfield><subfield code="a">765142696</subfield><subfield code="a">824876116</subfield><subfield code="a">856958657</subfield><subfield code="a">1060198137</subfield><subfield code="a">1153025206</subfield><subfield code="a">1179676182</subfield><subfield code="a">1194788699</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490566</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490563</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429458191</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429458194</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080475592</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080475590</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491587</subfield><subfield code="q">(electronic bk. ;</subfield><subfield code="q">Adobe Reader)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491586</subfield><subfield code="q">(electronic bk. ;</subfield><subfield code="q">Adobe Reader)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162131403</subfield><subfield code="z">(OCoLC)86078759</subfield><subfield code="z">(OCoLC)154664175</subfield><subfield code="z">(OCoLC)181842670</subfield><subfield code="z">(OCoLC)466943647</subfield><subfield code="z">(OCoLC)507575455</subfield><subfield code="z">(OCoLC)647612983</subfield><subfield code="z">(OCoLC)765142696</subfield><subfield code="z">(OCoLC)824876116</subfield><subfield code="z">(OCoLC)856958657</subfield><subfield code="z">(OCoLC)1060198137</subfield><subfield code="z">(OCoLC)1153025206</subfield><subfield code="z">(OCoLC)1179676182</subfield><subfield code="z">(OCoLC)1194788699</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">132624:132744</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S975 2006eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Syngress force emerging threat analysis :</subfield><subfield code="b">from mischief to malicious /</subfield><subfield code="c">David Maynor [and others].</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Emerging threat analysis</subfield></datafield><datafield tag="246" ind1="1" ind2="4"><subfield code="a">Syngress force 2006 emerging threat analysis : from mischief to malicious</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxx, 610 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrows Threats Today This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the best of this years top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future. * From Practical VoIP Security, Thomas Porter, Ph. D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security. * From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents the latest information on phishing and spam. * From Combating Spyware in the Enterprise, Brian Baskin, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and removal of spyware. * Also from Combating Spyware in the Enterprise, About.coms security expert Tony Bradley covers the transformation of spyware. * From Inside the SPAM Cartel, Spammer-X shows how spam is created and why it works so well. * From Securing IM and P2P Applications for the Enterprise, Paul Piccard, former manager of Internet Security Systems' Global Threat Operations Center, covers Skype security. * Also from Securing IM and P2P Applications for the Enterprise, Craig Edwards, creator of the IRC security software IRC Defender, discusses global IRC security. * From RFID Security, Brad Renderman Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application attacks. * Also from RFID Security, Frank Thornton, owner of Blackthorn Systems and an expert in wireless networks, discusses management of RFID security. * From Hack the Stack, security expert Michael Gregg covers attacking the people layer. * Bonus coverage includes exclusive material on device driver attacks by Dave Maynor, Senior Researcher at SecureWorks. * The best of this year: Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats * Complete Coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more * Covers secure enterprise-wide deployment of hottest technologies including Voice Over IP, Pocket PCs, smart phones, and more.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1: Analysis of Future Threat Levels Chapter 2: Pocket PCs and Smart Phones Chapter 3: Bots and Bot Networks Chapter 4: Malware Attacks Chapter 5: VoIP and SPIT Chapter 6: Compromising Security Software Chapter 7: Attacking and Defending Embedded Devices Chapter 8: DMA Attacks Chapter 9: Second-Tier and Seeded Landscape Attacks Chapter 10: How Vulnerable are SCADA Systems?</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maynor, David.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjGJT8vxtqWMkWWb8qVRDq</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007123414</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Syngress force emerging threat analysis (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG4vPjP9vwgq4MRypjXdFC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Syngress force emerging threat analysis.</subfield><subfield code="d">Rockland, MA : Syngress Pub., ©2006</subfield><subfield code="z">1597490563</subfield><subfield code="z">9781597490566</subfield><subfield code="w">(OCoLC)76941056</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=174833</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597490566</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00014079</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10150169</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">174833</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2537838</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2585992</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2712428</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn162131403 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:06Z |
institution | BVB |
isbn | 9781597490566 1597490563 9781429458191 1429458194 9780080475592 0080475590 9781597491587 1597491586 |
language | English |
oclc_num | 162131403 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxx, 610 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Syngress force emerging threat analysis : from mischief to malicious / David Maynor [and others]. Emerging threat analysis Syngress force 2006 emerging threat analysis : from mischief to malicious Rockland, MA : Syngress Pub., ©2006. 1 online resource (xxx, 610 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrows Threats Today This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the best of this years top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future. * From Practical VoIP Security, Thomas Porter, Ph. D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security. * From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents the latest information on phishing and spam. * From Combating Spyware in the Enterprise, Brian Baskin, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and removal of spyware. * Also from Combating Spyware in the Enterprise, About.coms security expert Tony Bradley covers the transformation of spyware. * From Inside the SPAM Cartel, Spammer-X shows how spam is created and why it works so well. * From Securing IM and P2P Applications for the Enterprise, Paul Piccard, former manager of Internet Security Systems' Global Threat Operations Center, covers Skype security. * Also from Securing IM and P2P Applications for the Enterprise, Craig Edwards, creator of the IRC security software IRC Defender, discusses global IRC security. * From RFID Security, Brad Renderman Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application attacks. * Also from RFID Security, Frank Thornton, owner of Blackthorn Systems and an expert in wireless networks, discusses management of RFID security. * From Hack the Stack, security expert Michael Gregg covers attacking the people layer. * Bonus coverage includes exclusive material on device driver attacks by Dave Maynor, Senior Researcher at SecureWorks. * The best of this year: Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats * Complete Coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more * Covers secure enterprise-wide deployment of hottest technologies including Voice Over IP, Pocket PCs, smart phones, and more. Chapter 1: Analysis of Future Threat Levels Chapter 2: Pocket PCs and Smart Phones Chapter 3: Bots and Bot Networks Chapter 4: Malware Attacks Chapter 5: VoIP and SPIT Chapter 6: Compromising Security Software Chapter 7: Attacking and Defending Embedded Devices Chapter 8: DMA Attacks Chapter 9: Second-Tier and Seeded Landscape Attacks Chapter 10: How Vulnerable are SCADA Systems? Print version record. Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer crimes Prevention. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer crimes Prevention fast Computer networks Security measures fast Computer security fast Maynor, David. https://id.oclc.org/worldcat/entity/E39PCjGJT8vxtqWMkWWb8qVRDq http://id.loc.gov/authorities/names/no2007123414 has work: Syngress force emerging threat analysis (Text) https://id.oclc.org/worldcat/entity/E39PCG4vPjP9vwgq4MRypjXdFC https://id.oclc.org/worldcat/ontology/hasWork Print version: Syngress force emerging threat analysis. Rockland, MA : Syngress Pub., ©2006 1597490563 9781597490566 (OCoLC)76941056 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=174833 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597490566 Volltext |
spellingShingle | Syngress force emerging threat analysis : from mischief to malicious / Chapter 1: Analysis of Future Threat Levels Chapter 2: Pocket PCs and Smart Phones Chapter 3: Bots and Bot Networks Chapter 4: Malware Attacks Chapter 5: VoIP and SPIT Chapter 6: Compromising Security Software Chapter 7: Attacking and Defending Embedded Devices Chapter 8: DMA Attacks Chapter 9: Second-Tier and Seeded Landscape Attacks Chapter 10: How Vulnerable are SCADA Systems? Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer crimes Prevention. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer crimes Prevention fast Computer networks Security measures fast Computer security fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 https://id.nlm.nih.gov/mesh/D016494 |
title | Syngress force emerging threat analysis : from mischief to malicious / |
title_alt | Emerging threat analysis Syngress force 2006 emerging threat analysis : from mischief to malicious |
title_auth | Syngress force emerging threat analysis : from mischief to malicious / |
title_exact_search | Syngress force emerging threat analysis : from mischief to malicious / |
title_full | Syngress force emerging threat analysis : from mischief to malicious / David Maynor [and others]. |
title_fullStr | Syngress force emerging threat analysis : from mischief to malicious / David Maynor [and others]. |
title_full_unstemmed | Syngress force emerging threat analysis : from mischief to malicious / David Maynor [and others]. |
title_short | Syngress force emerging threat analysis : |
title_sort | syngress force emerging threat analysis from mischief to malicious |
title_sub | from mischief to malicious / |
topic | Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer crimes Prevention. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer crimes Prevention fast Computer networks Security measures fast Computer security fast |
topic_facet | Computer security. Computer networks Security measures. Computer crimes Prevention. Computer Security Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer crimes Prevention Computer networks Security measures Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=174833 https://www.sciencedirect.com/science/book/9781597490566 |
work_keys_str_mv | AT maynordavid syngressforceemergingthreatanalysisfrommischieftomalicious AT maynordavid emergingthreatanalysis AT maynordavid syngressforce2006emergingthreatanalysisfrommischieftomalicious |