Combating spyware in the enterprise /:
Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate econ...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress,
2006.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate economy and network of malicious hackers and criminals. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (xx, 386 pages) : illustrations |
ISBN: | 0080502229 9780080502229 9781597490641 1597490644 1429416580 9781429416580 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn560262751 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 060822s2006 maua o 001 0 eng d | ||
040 | |a MERUC |b eng |e pn |c MERUC |d CCO |d E7B |d IDEBK |d OCLCQ |d YDXCP |d LGG |d QE2 |d DKDLA |d ZCU |d OCLCQ |d OCLCO |d N$T |d B24X7 |d OPELS |d OKU |d WPG |d FVL |d UMI |d DEBSZ |d OCLCQ |d OCLCF |d EBLCP |d OCLCQ |d COO |d AZK |d CNNOR |d COCUF |d MOR |d PIFBR |d LIV |d OCLCQ |d JBG |d OCLCQ |d U3W |d OCLCA |d STF |d BRL |d WRM |d D6H |d OCLCQ |d VTS |d CEF |d NRAMU |d AGLDB |d INT |d VT2 |d OCLCQ |d A6Q |d OCLCQ |d LEAUB |d OCLCQ |d UKCRE |d BRF |d INARC |d OCLCO |d OCLCQ |d IOY |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO |d COA | ||
019 | |a 76961082 |a 144222807 |a 162131427 |a 181421140 |a 369613697 |a 473717278 |a 481927270 |a 506982562 |a 647612960 |a 722517586 |a 728026772 |a 824882238 |a 935246570 |a 961644884 |a 962613753 |a 988444200 |a 992086451 |a 1035691744 |a 1037506131 |a 1038640475 |a 1045520401 |a 1055363164 |a 1076303689 |a 1081213235 |a 1152976258 |a 1153558048 |a 1192336841 |a 1228550363 |a 1240530786 |a 1255759995 |a 1340110999 | ||
020 | |a 0080502229 | ||
020 | |a 9780080502229 | ||
020 | |a 9781597490641 | ||
020 | |a 1597490644 | ||
020 | |a 1429416580 |q (electronic bk.) | ||
020 | |a 9781429416580 |q (electronic bk.) | ||
020 | |z 1597490644 | ||
020 | |z 9780080502229 | ||
024 | 1 | |a 792502906446 | |
024 | 8 | |a (WaSeSS)ssj0000125215 | |
035 | |a (OCoLC)560262751 |z (OCoLC)76961082 |z (OCoLC)144222807 |z (OCoLC)162131427 |z (OCoLC)181421140 |z (OCoLC)369613697 |z (OCoLC)473717278 |z (OCoLC)481927270 |z (OCoLC)506982562 |z (OCoLC)647612960 |z (OCoLC)722517586 |z (OCoLC)728026772 |z (OCoLC)824882238 |z (OCoLC)935246570 |z (OCoLC)961644884 |z (OCoLC)962613753 |z (OCoLC)988444200 |z (OCoLC)992086451 |z (OCoLC)1035691744 |z (OCoLC)1037506131 |z (OCoLC)1038640475 |z (OCoLC)1045520401 |z (OCoLC)1055363164 |z (OCoLC)1076303689 |z (OCoLC)1081213235 |z (OCoLC)1152976258 |z (OCoLC)1153558048 |z (OCoLC)1192336841 |z (OCoLC)1228550363 |z (OCoLC)1240530786 |z (OCoLC)1255759995 |z (OCoLC)1340110999 | ||
037 | |b 00991439 | ||
050 | 4 | |a QA76.76.S69 |b C64 2006eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Combating spyware in the enterprise / |c Brian Baskin [and others] ; Tony Piltzecker, technical editor. |
246 | 3 | 0 | |a Spyware in the enterprise |
260 | |a Rockland, MA : |b Syngress, |c 2006. | ||
300 | |a 1 online resource (xx, 386 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
520 | |a Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate economy and network of malicious hackers and criminals. | ||
505 | 0 | |a An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Spyware (Computer software) |0 http://id.loc.gov/authorities/subjects/sh2005000096 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Logiciels espions. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Spyware (Computer software) |2 fast | |
700 | 1 | |a Baskin, Brian. |1 https://id.oclc.org/worldcat/entity/E39PCjvwvYvgpfyCVY6C7wC9fy |0 http://id.loc.gov/authorities/names/no2006121700 | |
700 | 1 | |a Piltzecker, Tony, |d 1975- |1 https://id.oclc.org/worldcat/entity/E39PCjHjYVwR7TBhmjM9MVwDdP |0 http://id.loc.gov/authorities/names/n2001012811 | |
758 | |i has work: |a Combating spyware in the enterprise (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGY4bhBPhtvYJPcHrXCHfq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Combating spyware in the enterprise. |d Rockland, MA : Syngress, 2006 |z 1597490644 |w (OCoLC)71012129 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597490641 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=173423 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00014078 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL4052741 | ||
938 | |a ebrary |b EBRY |n ebr10150165 | ||
938 | |a EBSCOhost |b EBSC |n 173423 | ||
938 | |a YBP Library Services |b YANK |n 2730646 | ||
938 | |a YBP Library Services |b YANK |n 2500066 | ||
938 | |a YBP Library Services |b YANK |n 2627207 | ||
938 | |a Internet Archive |b INAR |n combatingspyware0000unse | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn560262751 |
---|---|
_version_ | 1816881707400298497 |
adam_text | |
any_adam_object | |
author2 | Baskin, Brian Piltzecker, Tony, 1975- |
author2_role | |
author2_variant | b b bb t p tp |
author_GND | http://id.loc.gov/authorities/names/no2006121700 http://id.loc.gov/authorities/names/n2001012811 |
author_facet | Baskin, Brian Piltzecker, Tony, 1975- |
author_sort | Baskin, Brian |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.S69 C64 2006eb |
callnumber-search | QA76.76.S69 C64 2006eb |
callnumber-sort | QA 276.76 S69 C64 42006EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention. |
ctrlnum | (OCoLC)560262751 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05116cam a2200781Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn560262751</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">060822s2006 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MERUC</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">LGG</subfield><subfield code="d">QE2</subfield><subfield code="d">DKDLA</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">B24X7</subfield><subfield code="d">OPELS</subfield><subfield code="d">OKU</subfield><subfield code="d">WPG</subfield><subfield code="d">FVL</subfield><subfield code="d">UMI</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">AZK</subfield><subfield code="d">CNNOR</subfield><subfield code="d">COCUF</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">NRAMU</subfield><subfield code="d">AGLDB</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">BRF</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COA</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">76961082</subfield><subfield code="a">144222807</subfield><subfield code="a">162131427</subfield><subfield code="a">181421140</subfield><subfield code="a">369613697</subfield><subfield code="a">473717278</subfield><subfield code="a">481927270</subfield><subfield code="a">506982562</subfield><subfield code="a">647612960</subfield><subfield code="a">722517586</subfield><subfield code="a">728026772</subfield><subfield code="a">824882238</subfield><subfield code="a">935246570</subfield><subfield code="a">961644884</subfield><subfield code="a">962613753</subfield><subfield code="a">988444200</subfield><subfield code="a">992086451</subfield><subfield code="a">1035691744</subfield><subfield code="a">1037506131</subfield><subfield code="a">1038640475</subfield><subfield code="a">1045520401</subfield><subfield code="a">1055363164</subfield><subfield code="a">1076303689</subfield><subfield code="a">1081213235</subfield><subfield code="a">1152976258</subfield><subfield code="a">1153558048</subfield><subfield code="a">1192336841</subfield><subfield code="a">1228550363</subfield><subfield code="a">1240530786</subfield><subfield code="a">1255759995</subfield><subfield code="a">1340110999</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080502229</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080502229</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490641</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490644</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429416580</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429416580</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597490644</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780080502229</subfield></datafield><datafield tag="024" ind1="1" ind2=" "><subfield code="a">792502906446</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">(WaSeSS)ssj0000125215</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)560262751</subfield><subfield code="z">(OCoLC)76961082</subfield><subfield code="z">(OCoLC)144222807</subfield><subfield code="z">(OCoLC)162131427</subfield><subfield code="z">(OCoLC)181421140</subfield><subfield code="z">(OCoLC)369613697</subfield><subfield code="z">(OCoLC)473717278</subfield><subfield code="z">(OCoLC)481927270</subfield><subfield code="z">(OCoLC)506982562</subfield><subfield code="z">(OCoLC)647612960</subfield><subfield code="z">(OCoLC)722517586</subfield><subfield code="z">(OCoLC)728026772</subfield><subfield code="z">(OCoLC)824882238</subfield><subfield code="z">(OCoLC)935246570</subfield><subfield code="z">(OCoLC)961644884</subfield><subfield code="z">(OCoLC)962613753</subfield><subfield code="z">(OCoLC)988444200</subfield><subfield code="z">(OCoLC)992086451</subfield><subfield code="z">(OCoLC)1035691744</subfield><subfield code="z">(OCoLC)1037506131</subfield><subfield code="z">(OCoLC)1038640475</subfield><subfield code="z">(OCoLC)1045520401</subfield><subfield code="z">(OCoLC)1055363164</subfield><subfield code="z">(OCoLC)1076303689</subfield><subfield code="z">(OCoLC)1081213235</subfield><subfield code="z">(OCoLC)1152976258</subfield><subfield code="z">(OCoLC)1153558048</subfield><subfield code="z">(OCoLC)1192336841</subfield><subfield code="z">(OCoLC)1228550363</subfield><subfield code="z">(OCoLC)1240530786</subfield><subfield code="z">(OCoLC)1255759995</subfield><subfield code="z">(OCoLC)1340110999</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="b">00991439</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.S69</subfield><subfield code="b">C64 2006eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Combating spyware in the enterprise /</subfield><subfield code="c">Brian Baskin [and others] ; Tony Piltzecker, technical editor.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Spyware in the enterprise</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xx, 386 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate economy and network of malicious hackers and criminals.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Spyware (Computer software)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2005000096</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels espions.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Spyware (Computer software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baskin, Brian.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjvwvYvgpfyCVY6C7wC9fy</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2006121700</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Piltzecker, Tony,</subfield><subfield code="d">1975-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjHjYVwR7TBhmjM9MVwDdP</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2001012811</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Combating spyware in the enterprise (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGY4bhBPhtvYJPcHrXCHfq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Combating spyware in the enterprise.</subfield><subfield code="d">Rockland, MA : Syngress, 2006</subfield><subfield code="z">1597490644</subfield><subfield code="w">(OCoLC)71012129</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597490641</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=173423</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00014078</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL4052741</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10150165</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">173423</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2730646</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2500066</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2627207</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">combatingspyware0000unse</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn560262751 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:17:00Z |
institution | BVB |
isbn | 0080502229 9780080502229 9781597490641 1597490644 1429416580 9781429416580 |
language | English |
oclc_num | 560262751 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xx, 386 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress, |
record_format | marc |
spelling | Combating spyware in the enterprise / Brian Baskin [and others] ; Tony Piltzecker, technical editor. Spyware in the enterprise Rockland, MA : Syngress, 2006. 1 online resource (xx, 386 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda Includes index. Print version record. Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate economy and network of malicious hackers and criminals. An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention. Computer security. Spyware (Computer software) http://id.loc.gov/authorities/subjects/sh2005000096 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Logiciels espions. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Spyware (Computer software) fast Baskin, Brian. https://id.oclc.org/worldcat/entity/E39PCjvwvYvgpfyCVY6C7wC9fy http://id.loc.gov/authorities/names/no2006121700 Piltzecker, Tony, 1975- https://id.oclc.org/worldcat/entity/E39PCjHjYVwR7TBhmjM9MVwDdP http://id.loc.gov/authorities/names/n2001012811 has work: Combating spyware in the enterprise (Text) https://id.oclc.org/worldcat/entity/E39PCGY4bhBPhtvYJPcHrXCHfq https://id.oclc.org/worldcat/ontology/hasWork Print version: Combating spyware in the enterprise. Rockland, MA : Syngress, 2006 1597490644 (OCoLC)71012129 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597490641 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=173423 Volltext |
spellingShingle | Combating spyware in the enterprise / An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention. Computer security. Spyware (Computer software) http://id.loc.gov/authorities/subjects/sh2005000096 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Logiciels espions. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Spyware (Computer software) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2005000096 https://id.nlm.nih.gov/mesh/D016494 |
title | Combating spyware in the enterprise / |
title_alt | Spyware in the enterprise |
title_auth | Combating spyware in the enterprise / |
title_exact_search | Combating spyware in the enterprise / |
title_full | Combating spyware in the enterprise / Brian Baskin [and others] ; Tony Piltzecker, technical editor. |
title_fullStr | Combating spyware in the enterprise / Brian Baskin [and others] ; Tony Piltzecker, technical editor. |
title_full_unstemmed | Combating spyware in the enterprise / Brian Baskin [and others] ; Tony Piltzecker, technical editor. |
title_short | Combating spyware in the enterprise / |
title_sort | combating spyware in the enterprise |
topic | Computer security. Spyware (Computer software) http://id.loc.gov/authorities/subjects/sh2005000096 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Logiciels espions. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Spyware (Computer software) fast |
topic_facet | Computer security. Spyware (Computer software) Computer Security Sécurité informatique. Logiciels espions. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security |
url | https://www.sciencedirect.com/science/book/9781597490641 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=173423 |
work_keys_str_mv | AT baskinbrian combatingspywareintheenterprise AT piltzeckertony combatingspywareintheenterprise AT baskinbrian spywareintheenterprise AT piltzeckertony spywareintheenterprise |