Botnets :: the killer web app /
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following c...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress Pub.,
©2007.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets. * This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise * Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself. |
Beschreibung: | 1 online resource (xv, 464 pages) : illustrations |
ISBN: | 9781597491358 1597491357 0080500234 9780080500232 9781429456593 1429456590 1281060232 9781281060235 9786611060237 6611060235 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn162131556 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 070802s2007 maua o 001 0 eng d | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OCLCQ |d N$T |d YDXCP |d LVB |d UBY |d IDEBK |d E7B |d AU@ |d EBLCP |d OCLCO |d DKDLA |d UMI |d DEBSZ |d OCLCQ |d OCLCF |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d COO |d OCLCO |d OCLCQ |d OCLCO |d AGLDB |d Z5A |d MERUC |d OCLCQ |d JBG |d OCLCA |d ROC |d D6H |d UAB |d OCLCQ |d VTS |d CEF |d OCLCQ |d STF |d LEAUB |d VT2 |d OCLCQ |d VLY |d AJS |d OCLCQ |d OCLCO |d M8D |d OCLCO |d OCLCQ |d KSU |d OCL |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d INARC | ||
015 | |a GBA734026 |2 bnb | ||
019 | |a 85821827 |a 171131710 |a 271611373 |a 488133729 |a 505126864 |a 647645234 |a 824140481 |a 1020517194 |a 1103267683 |a 1129378208 |a 1152996349 |a 1162442864 | ||
020 | |a 9781597491358 | ||
020 | |a 1597491357 | ||
020 | |a 0080500234 | ||
020 | |a 9780080500232 | ||
020 | |a 9781429456593 | ||
020 | |a 1429456590 | ||
020 | |a 1281060232 | ||
020 | |a 9781281060235 | ||
020 | |a 9786611060237 | ||
020 | |a 6611060235 | ||
035 | |a (OCoLC)162131556 |z (OCoLC)85821827 |z (OCoLC)171131710 |z (OCoLC)271611373 |z (OCoLC)488133729 |z (OCoLC)505126864 |z (OCoLC)647645234 |z (OCoLC)824140481 |z (OCoLC)1020517194 |z (OCoLC)1103267683 |z (OCoLC)1129378208 |z (OCoLC)1152996349 |z (OCoLC)1162442864 | ||
037 | |a 138456:138593 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.59 |b .S345 2007eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Schiller, Craig A. | |
245 | 1 | 0 | |a Botnets : |b the killer web app / |c Craig A. Schiller [and others]. |
260 | |a Rockland, MA : |b Syngress Pub., |c ©2007. | ||
300 | |a 1 online resource (xv, 464 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets. * This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise * Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself. | ||
505 | 0 | |a Botnets: A Call to Action -- Botnets Overview -- Alternative Botnet C & Cs -- Common Botnets -- Botnet Detection: Tools and Techniques -- Ourmon: Overview and Installation -- Ourmon: Anomaly Detection Tools -- IRC and Botnets -- Advanced Ourmon Techniques -- Using Sandbox Tools for Botnets -- Intelligence Resources -- Responding to Botnets. | |
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Web sites |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Intelligent agents (Computer software) |0 http://id.loc.gov/authorities/subjects/sh97000493 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Sites Web |x Sécurité |x Mesures. | |
650 | 6 | |a Agents intelligents (Logiciels) | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Intelligent agents (Computer software) |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Web sites |x Security measures |2 fast | |
758 | |i has work: |a Botnets (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFVbjPv67wqbpgghbq7FgC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Schiller, Craig A. |t Botnets. |d Rockland, MA : Syngress Pub., ©2007 |z 1597491357 |z 9781597491358 |w (OCoLC)82451884 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597491358 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=184406 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL289737 | ||
938 | |a ebrary |b EBRY |n ebr10156084 | ||
938 | |a EBSCOhost |b EBSC |n 184406 | ||
938 | |a YBP Library Services |b YANK |n 2532825 | ||
938 | |a YBP Library Services |b YANK |n 2613813 | ||
938 | |a Internet Archive |b INAR |n botnetskillerweb0000unse | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn162131556 |
---|---|
_version_ | 1816881650935529472 |
adam_text | |
any_adam_object | |
author | Schiller, Craig A. |
author_facet | Schiller, Craig A. |
author_role | |
author_sort | Schiller, Craig A. |
author_variant | c a s ca cas |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .S345 2007eb |
callnumber-search | TK5105.59 .S345 2007eb |
callnumber-sort | TK 45105.59 S345 42007EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Botnets: A Call to Action -- Botnets Overview -- Alternative Botnet C & Cs -- Common Botnets -- Botnet Detection: Tools and Techniques -- Ourmon: Overview and Installation -- Ourmon: Anomaly Detection Tools -- IRC and Botnets -- Advanced Ourmon Techniques -- Using Sandbox Tools for Botnets -- Intelligence Resources -- Responding to Botnets. |
ctrlnum | (OCoLC)162131556 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05123cam a2200805 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn162131556</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">070802s2007 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">LVB</subfield><subfield code="d">UBY</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">AU@</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DKDLA</subfield><subfield code="d">UMI</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">Z5A</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">ROC</subfield><subfield code="d">D6H</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">LEAUB</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VLY</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">KSU</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INARC</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA734026</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">85821827</subfield><subfield code="a">171131710</subfield><subfield code="a">271611373</subfield><subfield code="a">488133729</subfield><subfield code="a">505126864</subfield><subfield code="a">647645234</subfield><subfield code="a">824140481</subfield><subfield code="a">1020517194</subfield><subfield code="a">1103267683</subfield><subfield code="a">1129378208</subfield><subfield code="a">1152996349</subfield><subfield code="a">1162442864</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491358</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491357</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080500234</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080500232</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429456593</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429456590</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281060232</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281060235</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611060237</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611060235</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162131556</subfield><subfield code="z">(OCoLC)85821827</subfield><subfield code="z">(OCoLC)171131710</subfield><subfield code="z">(OCoLC)271611373</subfield><subfield code="z">(OCoLC)488133729</subfield><subfield code="z">(OCoLC)505126864</subfield><subfield code="z">(OCoLC)647645234</subfield><subfield code="z">(OCoLC)824140481</subfield><subfield code="z">(OCoLC)1020517194</subfield><subfield code="z">(OCoLC)1103267683</subfield><subfield code="z">(OCoLC)1129378208</subfield><subfield code="z">(OCoLC)1152996349</subfield><subfield code="z">(OCoLC)1162442864</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">138456:138593</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.S345 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schiller, Craig A.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Botnets :</subfield><subfield code="b">the killer web app /</subfield><subfield code="c">Craig A. Schiller [and others].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xv, 464 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets. * This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise * Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Botnets: A Call to Action -- Botnets Overview -- Alternative Botnet C & Cs -- Common Botnets -- Botnet Detection: Tools and Techniques -- Ourmon: Overview and Installation -- Ourmon: Anomaly Detection Tools -- IRC and Botnets -- Advanced Ourmon Techniques -- Using Sandbox Tools for Botnets -- Intelligence Resources -- Responding to Botnets.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web sites</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intelligent agents (Computer software)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh97000493</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sites Web</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Agents intelligents (Logiciels)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intelligent agents (Computer software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Botnets (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFVbjPv67wqbpgghbq7FgC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Schiller, Craig A.</subfield><subfield code="t">Botnets.</subfield><subfield code="d">Rockland, MA : Syngress Pub., ©2007</subfield><subfield code="z">1597491357</subfield><subfield code="z">9781597491358</subfield><subfield code="w">(OCoLC)82451884</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597491358</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=184406</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL289737</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10156084</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">184406</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2532825</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2613813</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">botnetskillerweb0000unse</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn162131556 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:06Z |
institution | BVB |
isbn | 9781597491358 1597491357 0080500234 9780080500232 9781429456593 1429456590 1281060232 9781281060235 9786611060237 6611060235 |
language | English |
oclc_num | 162131556 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xv, 464 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Schiller, Craig A. Botnets : the killer web app / Craig A. Schiller [and others]. Rockland, MA : Syngress Pub., ©2007. 1 online resource (xv, 464 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets. * This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise * Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself. Botnets: A Call to Action -- Botnets Overview -- Alternative Botnet C & Cs -- Common Botnets -- Botnet Detection: Tools and Techniques -- Ourmon: Overview and Installation -- Ourmon: Anomaly Detection Tools -- IRC and Botnets -- Advanced Ourmon Techniques -- Using Sandbox Tools for Botnets -- Intelligence Resources -- Responding to Botnets. Print version record. English. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Web sites Security measures. Computer security. Intelligent agents (Computer software) http://id.loc.gov/authorities/subjects/sh97000493 Computer Security https://id.nlm.nih.gov/mesh/D016494 Réseaux d'ordinateurs Sécurité Mesures. Sites Web Sécurité Mesures. Agents intelligents (Logiciels) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Intelligent agents (Computer software) fast Computer networks Security measures fast Computer security fast Web sites Security measures fast has work: Botnets (Text) https://id.oclc.org/worldcat/entity/E39PCFVbjPv67wqbpgghbq7FgC https://id.oclc.org/worldcat/ontology/hasWork Print version: Schiller, Craig A. Botnets. Rockland, MA : Syngress Pub., ©2007 1597491357 9781597491358 (OCoLC)82451884 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597491358 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=184406 Volltext |
spellingShingle | Schiller, Craig A. Botnets : the killer web app / Botnets: A Call to Action -- Botnets Overview -- Alternative Botnet C & Cs -- Common Botnets -- Botnet Detection: Tools and Techniques -- Ourmon: Overview and Installation -- Ourmon: Anomaly Detection Tools -- IRC and Botnets -- Advanced Ourmon Techniques -- Using Sandbox Tools for Botnets -- Intelligence Resources -- Responding to Botnets. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Web sites Security measures. Computer security. Intelligent agents (Computer software) http://id.loc.gov/authorities/subjects/sh97000493 Computer Security https://id.nlm.nih.gov/mesh/D016494 Réseaux d'ordinateurs Sécurité Mesures. Sites Web Sécurité Mesures. Agents intelligents (Logiciels) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Intelligent agents (Computer software) fast Computer networks Security measures fast Computer security fast Web sites Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh97000493 https://id.nlm.nih.gov/mesh/D016494 |
title | Botnets : the killer web app / |
title_auth | Botnets : the killer web app / |
title_exact_search | Botnets : the killer web app / |
title_full | Botnets : the killer web app / Craig A. Schiller [and others]. |
title_fullStr | Botnets : the killer web app / Craig A. Schiller [and others]. |
title_full_unstemmed | Botnets : the killer web app / Craig A. Schiller [and others]. |
title_short | Botnets : |
title_sort | botnets the killer web app |
title_sub | the killer web app / |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Web sites Security measures. Computer security. Intelligent agents (Computer software) http://id.loc.gov/authorities/subjects/sh97000493 Computer Security https://id.nlm.nih.gov/mesh/D016494 Réseaux d'ordinateurs Sécurité Mesures. Sites Web Sécurité Mesures. Agents intelligents (Logiciels) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Intelligent agents (Computer software) fast Computer networks Security measures fast Computer security fast Web sites Security measures fast |
topic_facet | Computer networks Security measures. Web sites Security measures. Computer security. Intelligent agents (Computer software) Computer Security Réseaux d'ordinateurs Sécurité Mesures. Sites Web Sécurité Mesures. Agents intelligents (Logiciels) Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security Web sites Security measures |
url | https://www.sciencedirect.com/science/book/9781597491358 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=184406 |
work_keys_str_mv | AT schillercraiga botnetsthekillerwebapp |