000 | 05455cam a2201021 i 4500 | ||
---|---|---|---|
001 | ocn913742234 | ||
003 | OCoLC | ||
005 | 20240523125538.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 150713s2015 inu ob 001 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dOCLCO _dIDEBK _dDEBSZ _dOCLCO _dBAL _dYDXCP _dDG1 _dOCLCO _dCDX _dSTF _dB24X7 _dOCLCF _dOCLCO _dCOO _dOCLCO _dEBLCP _dOCLCQ _dDEBBG _dBAL _dRECBK _dCCO _dIDB _dLOA _dCOCUF _dDG1 _dK6U _dLIP _dPIFAG _dFVL _dZCU _dLIV _dOCLCQ _dMERUC _dOCLCQ _dOCLCA _dU3W _dOCLCA _dD6H _dOCLCQ _dWRM _dDEHBZ _dICG _dVT2 _dOCLCQ _dWYU _dG3B _dTKN _dOCLCQ _dDKC _dAU@ _dOCLCQ _dUKAHL _dAUD _dOCLCQ _dDCT _dUKMGB _dOCLCQ _dUMI _dBRF _dOCLCO _dOCLCQ _dOCLCO _dOCLCQ _dOCLCL |
||
015 |
_aGBB506838 _2bnb |
||
016 | 7 |
_a017011707 _2Uk |
|
019 |
_a959273207 _a959873288 _a1055392388 _a1066426311 _a1081220237 _a1136155472 _a1152976595 _a1192346952 _a1228605608 |
||
020 |
_a9781119183440 _q(electronic bk.) |
||
020 |
_a1119183448 _q(electronic bk.) |
||
020 |
_a9781118987087 _q(electronic bk.) |
||
020 |
_a111898708X _q(electronic bk.) |
||
020 | _a9781118987230 | ||
020 | _a1118987233 | ||
020 | _a1118987128 | ||
020 | _a9781118987124 | ||
020 | _z9781118987124 | ||
029 | 1 |
_aAU@ _b000056104417 |
|
029 | 1 |
_aCHDSB _b006441166 |
|
029 | 1 |
_aCHNEW _b000944523 |
|
029 | 1 |
_aCHVBK _b339960892 |
|
029 | 1 |
_aCHVBK _b480247595 |
|
029 | 1 |
_aDEBBG _bBV043397940 |
|
029 | 1 |
_aDEBBG _bBV043892434 |
|
029 | 1 |
_aDEBSZ _b442835701 |
|
029 | 1 |
_aDEBSZ _b468874771 |
|
029 | 1 |
_aUKMGB _b017011707 |
|
035 |
_a(OCoLC)913742234 _z(OCoLC)959273207 _z(OCoLC)959873288 _z(OCoLC)1055392388 _z(OCoLC)1066426311 _z(OCoLC)1081220237 _z(OCoLC)1136155472 _z(OCoLC)1152976595 _z(OCoLC)1192346952 _z(OCoLC)1228605608 |
||
037 |
_a9781118987230 _bWiley |
||
050 | 4 |
_aHF5548.37 _bM665 2015eb |
|
072 | 7 |
_aBUS _x082000 _2bisacsh |
|
072 | 7 |
_aBUS _x041000 _2bisacsh |
|
072 | 7 |
_aBUS _x042000 _2bisacsh |
|
072 | 7 |
_aBUS _x085000 _2bisacsh |
|
082 | 0 | 4 |
_a658.4/78 _223 |
049 | _aMAIN | ||
100 | 1 |
_aMonte, Matthew, _eauthor. |
|
245 | 1 | 0 |
_aNetwork attacks and exploitation : _ba framework / _cMatthew Monte. |
246 | 3 | _aNetwork attacks & exploitation | |
264 | 1 |
_aIndianapolis, IN : _bWiley, _c2015. |
|
264 | 4 | _c�2015 | |
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
588 | 0 | _aOnline resource; title from PDF title page (EBSCO, viewed July 15, 2015). | |
505 | 0 | _aComputer Network Exploitation -- The Attacker -- The Defender -- Asymmetries -- Attacker Frictions -- Defender Frictions -- Offensive Strategy -- Defensive Strategy -- Offensive Case Studies. | |
504 | _aIncludes bibliographical references and index. | ||
520 |
_aThis book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. -- _cEdited summary from book. |
||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 |
_aBusiness enterprises _xComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer crimes _xPrevention. |
|
650 | 0 |
_aCorporations _xSecurity measures. |
|
650 | 2 | _aComputer Security | |
650 | 6 | _aS�ecurit�e informatique. | |
650 | 6 |
_aSoci�et�es _xS�ecurit�e _xMesures. |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xIndustrial Management. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xManagement. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xManagement Science. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xOrganizational Behavior. _2bisacsh |
|
650 | 7 |
_aBusiness enterprises _xComputer networks _xSecurity measures _2fast |
|
650 | 7 |
_aComputer crimes _xPrevention _2fast |
|
650 | 7 |
_aComputer security _2fast |
|
650 | 7 |
_aCorporations _xSecurity measures _2fast |
|
758 |
_ihas work: _aNetwork attacks and exploitation (Text) _1https://id.oclc.org/worldcat/entity/E39PCG7rjmQfMvtYVpHgmVKtDq _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _aMonte, Matthew. _tNetwork attacks & exploitation : a framework. _dIndianapolis, Indiana : Wiley, �2015 _hxviii, 198 pages _z9781118987124 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119183440 |
938 |
_aAskews and Holts Library Services _bASKH _nAH27098969 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH27099455 |
||
938 |
_aBooks 24x7 _bB247 _nbks00080730 |
||
938 |
_aCoutts Information Services _bCOUT _n29652605 |
||
938 |
_aEBL - Ebook Library _bEBLB _nEBL4040351 |
||
938 |
_aEBSCOhost _bEBSC _n1023136 |
||
938 |
_aProQuest MyiLibrary Digital eBook Collection _bIDEB _ncis29652605 |
||
938 |
_aRecorded Books, LLC _bRECE _nrbeEB00621892 |
||
938 |
_aYBP Library Services _bYANK _n12522592 |
||
938 |
_aYBP Library Services _bYANK _n12673795 |
||
938 |
_aYBP Library Services _bYANK _n12580749 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12244 _d12244 |