An introduction to hacking and crimeware :: a pocket guide /
An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activiti...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, Cambridgeshire :
IT Governance Pub.,
2012.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities. |
Beschreibung: | 1 online resource (53 pages) |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781849283298 184928329X 9781849283304 1849283303 1299468659 9781299468658 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn794491658 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 120509s2012 enk obf 000 0 eng d | ||
040 | |a E7B |b eng |e pn |c E7B |d B24X7 |d OCLCO |d DEBSZ |d OCLCQ |d N$T |d OCLCQ |d YDXCP |d UMI |d COO |d JSTOR |d OCLCF |d OCLCO |d MHW |d MEAUC |d WAU |d IDEBK |d OCL |d OCLCQ |d DEBBG |d CUS |d OCLCQ |d AGLDB |d LIV |d OCLCQ |d MERUC |d OCLCQ |d JBG |d OCLCA |d IOG |d OCLCA |d VTS |d CEF |d OCLCQ |d LVT |d STF |d UAB |d M8D |d UKAHL |d HS0 |d UX1 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d DEGRU | ||
019 | |a 842891563 |a 843642499 |a 857717647 |a 900317338 |a 1175627118 | ||
020 | |a 9781849283298 |q (electronic bk.) | ||
020 | |a 184928329X |q (electronic bk.) | ||
020 | |a 9781849283304 | ||
020 | |a 1849283303 | ||
020 | |a 1299468659 |q (ebk) | ||
020 | |a 9781299468658 |q (ebk) | ||
020 | |z 1849283281 | ||
020 | |z 9781849283281 | ||
035 | |a (OCoLC)794491658 |z (OCoLC)842891563 |z (OCoLC)843642499 |z (OCoLC)857717647 |z (OCoLC)900317338 |z (OCoLC)1175627118 | ||
037 | |a CL0500000277 |b Safari Books Online | ||
037 | |a 22573/ctt4k5j6w |b JSTOR | ||
050 | 4 | |a QA76.9.A25 |b L64 2012eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
084 | |a ST 276 |q BVB |2 rvk |0 (DE-625)rvk/143642: | ||
049 | |a MAIN | ||
100 | 1 | |a Loewengart, Victoria, |e author. |0 http://id.loc.gov/authorities/names/nb2013000070 | |
245 | 1 | 3 | |a An introduction to hacking and crimeware : |b a pocket guide / |c Victoria Loewengart. |
260 | |a Ely, Cambridgeshire : |b IT Governance Pub., |c 2012. | ||
300 | |a 1 online resource (53 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Cover; Title; Copyright; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: Background; Chapter 2: Crimeware Products; "Zero Day" exploit toolkits; "Zeus"; "SpyEye"; "Darkness" DDoS botnet tool; Chapter 3: Unintentional Crimeware; SkyGrabber; Passware Kit; Maltego; Chapter 4: The Present and The Future; Chapter 5: Fighting Back; How to protect yourself from botnet infections; Active defense; Conclusion; Authoritative Sources Of Information; Bibliography; ITG Resources. | |
520 | |a An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security |v Handbooks, manuals, etc. | |
650 | 0 | |a Internet |x Security measures |v Handbooks, manuals, etc. | |
650 | 0 | |a Computer crimes |x Prevention |v Handbooks, manuals, etc. | |
650 | 6 | |a Sécurité informatique |v Guides, manuels, etc. | |
650 | 6 | |a Internet |x Sécurité |x Mesures |v Guides, manuels, etc. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
655 | 7 | |a Handbooks and manuals |2 fast | |
758 | |i has work: |a An introduction to hacking and crimeware (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGJpw4CFcRd4PY999M3TXm |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Loewengart, Victoria. |t Introduction to hacking and crimeware. |d IT Governance, 2012 |z 9781849283281 |w (OCoLC)778916004 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=571576 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH36161582 | ||
938 | |a De Gruyter |b DEGR |n 9781849283298 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26135064 | ||
938 | |a Books 24x7 |b B247 |n bks00047053 | ||
938 | |a ebrary |b EBRY |n ebr10554859 | ||
938 | |a EBSCOhost |b EBSC |n 571576 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis25302578 | ||
938 | |a YBP Library Services |b YANK |n 7627850 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn794491658 |
---|---|
_version_ | 1816881796671864833 |
adam_text | |
any_adam_object | |
author | Loewengart, Victoria |
author_GND | http://id.loc.gov/authorities/names/nb2013000070 |
author_facet | Loewengart, Victoria |
author_role | aut |
author_sort | Loewengart, Victoria |
author_variant | v l vl |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 L64 2012eb |
callnumber-search | QA76.9.A25 L64 2012eb |
callnumber-sort | QA 276.9 A25 L64 42012EB |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
collection | ZDB-4-EBA |
contents | Cover; Title; Copyright; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: Background; Chapter 2: Crimeware Products; "Zero Day" exploit toolkits; "Zeus"; "SpyEye"; "Darkness" DDoS botnet tool; Chapter 3: Unintentional Crimeware; SkyGrabber; Passware Kit; Maltego; Chapter 4: The Present and The Future; Chapter 5: Fighting Back; How to protect yourself from botnet infections; Active defense; Conclusion; Authoritative Sources Of Information; Bibliography; ITG Resources. |
ctrlnum | (OCoLC)794491658 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04318cam a2200769Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn794491658</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">120509s2012 enk obf 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">E7B</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">E7B</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">UMI</subfield><subfield code="d">COO</subfield><subfield code="d">JSTOR</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">MHW</subfield><subfield code="d">MEAUC</subfield><subfield code="d">WAU</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBBG</subfield><subfield code="d">CUS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">IOG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LVT</subfield><subfield code="d">STF</subfield><subfield code="d">UAB</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">HS0</subfield><subfield code="d">UX1</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">DEGRU</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">842891563</subfield><subfield code="a">843642499</subfield><subfield code="a">857717647</subfield><subfield code="a">900317338</subfield><subfield code="a">1175627118</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283298</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">184928329X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283304</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283303</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299468659</subfield><subfield code="q">(ebk)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299468658</subfield><subfield code="q">(ebk)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1849283281</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849283281</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)794491658</subfield><subfield code="z">(OCoLC)842891563</subfield><subfield code="z">(OCoLC)843642499</subfield><subfield code="z">(OCoLC)857717647</subfield><subfield code="z">(OCoLC)900317338</subfield><subfield code="z">(OCoLC)1175627118</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000277</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt4k5j6w</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">L64 2012eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="q">BVB</subfield><subfield code="2">rvk</subfield><subfield code="0">(DE-625)rvk/143642:</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Loewengart, Victoria,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2013000070</subfield></datafield><datafield tag="245" ind1="1" ind2="3"><subfield code="a">An introduction to hacking and crimeware :</subfield><subfield code="b">a pocket guide /</subfield><subfield code="c">Victoria Loewengart.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Ely, Cambridgeshire :</subfield><subfield code="b">IT Governance Pub.,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (53 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title; Copyright; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: Background; Chapter 2: Crimeware Products; "Zero Day" exploit toolkits; "Zeus"; "SpyEye"; "Darkness" DDoS botnet tool; Chapter 3: Unintentional Crimeware; SkyGrabber; Passware Kit; Maltego; Chapter 4: The Present and The Future; Chapter 5: Fighting Back; How to protect yourself from botnet infections; Active defense; Conclusion; Authoritative Sources Of Information; Bibliography; ITG Resources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">An introduction to hacking and crimeware (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGJpw4CFcRd4PY999M3TXm</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Loewengart, Victoria.</subfield><subfield code="t">Introduction to hacking and crimeware.</subfield><subfield code="d">IT Governance, 2012</subfield><subfield code="z">9781849283281</subfield><subfield code="w">(OCoLC)778916004</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=571576</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH36161582</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9781849283298</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26135064</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00047053</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10554859</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">571576</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis25302578</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7627850</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Handbooks and manuals fast |
genre_facet | Handbooks and manuals |
id | ZDB-4-EBA-ocn794491658 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:18:25Z |
institution | BVB |
isbn | 9781849283298 184928329X 9781849283304 1849283303 1299468659 9781299468658 |
language | English |
oclc_num | 794491658 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (53 pages) |
psigel | ZDB-4-EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | IT Governance Pub., |
record_format | marc |
spelling | Loewengart, Victoria, author. http://id.loc.gov/authorities/names/nb2013000070 An introduction to hacking and crimeware : a pocket guide / Victoria Loewengart. Ely, Cambridgeshire : IT Governance Pub., 2012. 1 online resource (53 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references. Cover; Title; Copyright; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: Background; Chapter 2: Crimeware Products; "Zero Day" exploit toolkits; "Zeus"; "SpyEye"; "Darkness" DDoS botnet tool; Chapter 3: Unintentional Crimeware; SkyGrabber; Passware Kit; Maltego; Chapter 4: The Present and The Future; Chapter 5: Fighting Back; How to protect yourself from botnet infections; Active defense; Conclusion; Authoritative Sources Of Information; Bibliography; ITG Resources. An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities. Print version record. Computer security Handbooks, manuals, etc. Internet Security measures Handbooks, manuals, etc. Computer crimes Prevention Handbooks, manuals, etc. Sécurité informatique Guides, manuels, etc. Internet Sécurité Mesures Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer crimes Prevention fast Computer security fast Internet Security measures fast Handbooks and manuals fast has work: An introduction to hacking and crimeware (Text) https://id.oclc.org/worldcat/entity/E39PCGJpw4CFcRd4PY999M3TXm https://id.oclc.org/worldcat/ontology/hasWork Print version: Loewengart, Victoria. Introduction to hacking and crimeware. IT Governance, 2012 9781849283281 (OCoLC)778916004 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=571576 Volltext |
spellingShingle | Loewengart, Victoria An introduction to hacking and crimeware : a pocket guide / Cover; Title; Copyright; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: Background; Chapter 2: Crimeware Products; "Zero Day" exploit toolkits; "Zeus"; "SpyEye"; "Darkness" DDoS botnet tool; Chapter 3: Unintentional Crimeware; SkyGrabber; Passware Kit; Maltego; Chapter 4: The Present and The Future; Chapter 5: Fighting Back; How to protect yourself from botnet infections; Active defense; Conclusion; Authoritative Sources Of Information; Bibliography; ITG Resources. Computer security Handbooks, manuals, etc. Internet Security measures Handbooks, manuals, etc. Computer crimes Prevention Handbooks, manuals, etc. Sécurité informatique Guides, manuels, etc. Internet Sécurité Mesures Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer crimes Prevention fast Computer security fast Internet Security measures fast |
title | An introduction to hacking and crimeware : a pocket guide / |
title_auth | An introduction to hacking and crimeware : a pocket guide / |
title_exact_search | An introduction to hacking and crimeware : a pocket guide / |
title_full | An introduction to hacking and crimeware : a pocket guide / Victoria Loewengart. |
title_fullStr | An introduction to hacking and crimeware : a pocket guide / Victoria Loewengart. |
title_full_unstemmed | An introduction to hacking and crimeware : a pocket guide / Victoria Loewengart. |
title_short | An introduction to hacking and crimeware : |
title_sort | introduction to hacking and crimeware a pocket guide |
title_sub | a pocket guide / |
topic | Computer security Handbooks, manuals, etc. Internet Security measures Handbooks, manuals, etc. Computer crimes Prevention Handbooks, manuals, etc. Sécurité informatique Guides, manuels, etc. Internet Sécurité Mesures Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer crimes Prevention fast Computer security fast Internet Security measures fast |
topic_facet | Computer security Handbooks, manuals, etc. Internet Security measures Handbooks, manuals, etc. Computer crimes Prevention Handbooks, manuals, etc. Sécurité informatique Guides, manuels, etc. Internet Sécurité Mesures Guides, manuels, etc. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer crimes Prevention Computer security Internet Security measures Handbooks and manuals |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=571576 |
work_keys_str_mv | AT loewengartvictoria anintroductiontohackingandcrimewareapocketguide AT loewengartvictoria introductiontohackingandcrimewareapocketguide |