000 05455cam a2201021 i 4500
001 ocn913742234
003 OCoLC
005 20240523125538.0
006 m o d
007 cr cnu|||unuuu
008 150713s2015 inu ob 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dOCLCO
_dIDEBK
_dDEBSZ
_dOCLCO
_dBAL
_dYDXCP
_dDG1
_dOCLCO
_dCDX
_dSTF
_dB24X7
_dOCLCF
_dOCLCO
_dCOO
_dOCLCO
_dEBLCP
_dOCLCQ
_dDEBBG
_dBAL
_dRECBK
_dCCO
_dIDB
_dLOA
_dCOCUF
_dDG1
_dK6U
_dLIP
_dPIFAG
_dFVL
_dZCU
_dLIV
_dOCLCQ
_dMERUC
_dOCLCQ
_dOCLCA
_dU3W
_dOCLCA
_dD6H
_dOCLCQ
_dWRM
_dDEHBZ
_dICG
_dVT2
_dOCLCQ
_dWYU
_dG3B
_dTKN
_dOCLCQ
_dDKC
_dAU@
_dOCLCQ
_dUKAHL
_dAUD
_dOCLCQ
_dDCT
_dUKMGB
_dOCLCQ
_dUMI
_dBRF
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCQ
_dOCLCL
015 _aGBB506838
_2bnb
016 7 _a017011707
_2Uk
019 _a959273207
_a959873288
_a1055392388
_a1066426311
_a1081220237
_a1136155472
_a1152976595
_a1192346952
_a1228605608
020 _a9781119183440
_q(electronic bk.)
020 _a1119183448
_q(electronic bk.)
020 _a9781118987087
_q(electronic bk.)
020 _a111898708X
_q(electronic bk.)
020 _a9781118987230
020 _a1118987233
020 _a1118987128
020 _a9781118987124
020 _z9781118987124
029 1 _aAU@
_b000056104417
029 1 _aCHDSB
_b006441166
029 1 _aCHNEW
_b000944523
029 1 _aCHVBK
_b339960892
029 1 _aCHVBK
_b480247595
029 1 _aDEBBG
_bBV043397940
029 1 _aDEBBG
_bBV043892434
029 1 _aDEBSZ
_b442835701
029 1 _aDEBSZ
_b468874771
029 1 _aUKMGB
_b017011707
035 _a(OCoLC)913742234
_z(OCoLC)959273207
_z(OCoLC)959873288
_z(OCoLC)1055392388
_z(OCoLC)1066426311
_z(OCoLC)1081220237
_z(OCoLC)1136155472
_z(OCoLC)1152976595
_z(OCoLC)1192346952
_z(OCoLC)1228605608
037 _a9781118987230
_bWiley
050 4 _aHF5548.37
_bM665 2015eb
072 7 _aBUS
_x082000
_2bisacsh
072 7 _aBUS
_x041000
_2bisacsh
072 7 _aBUS
_x042000
_2bisacsh
072 7 _aBUS
_x085000
_2bisacsh
082 0 4 _a658.4/78
_223
049 _aMAIN
100 1 _aMonte, Matthew,
_eauthor.
245 1 0 _aNetwork attacks and exploitation :
_ba framework /
_cMatthew Monte.
246 3 _aNetwork attacks & exploitation
264 1 _aIndianapolis, IN :
_bWiley,
_c2015.
264 4 _c�2015
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
588 0 _aOnline resource; title from PDF title page (EBSCO, viewed July 15, 2015).
505 0 _aComputer Network Exploitation -- The Attacker -- The Defender -- Asymmetries -- Attacker Frictions -- Defender Frictions -- Offensive Strategy -- Defensive Strategy -- Offensive Case Studies.
504 _aIncludes bibliographical references and index.
520 _aThis book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. --
_cEdited summary from book.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aBusiness enterprises
_xComputer networks
_xSecurity measures.
650 0 _aComputer security.
650 0 _aComputer crimes
_xPrevention.
650 0 _aCorporations
_xSecurity measures.
650 2 _aComputer Security
650 6 _aS�ecurit�e informatique.
650 6 _aSoci�et�es
_xS�ecurit�e
_xMesures.
650 7 _aBUSINESS & ECONOMICS
_xIndustrial Management.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xManagement.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xManagement Science.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xOrganizational Behavior.
_2bisacsh
650 7 _aBusiness enterprises
_xComputer networks
_xSecurity measures
_2fast
650 7 _aComputer crimes
_xPrevention
_2fast
650 7 _aComputer security
_2fast
650 7 _aCorporations
_xSecurity measures
_2fast
758 _ihas work:
_aNetwork attacks and exploitation (Text)
_1https://id.oclc.org/worldcat/entity/E39PCG7rjmQfMvtYVpHgmVKtDq
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aMonte, Matthew.
_tNetwork attacks & exploitation : a framework.
_dIndianapolis, Indiana : Wiley, �2015
_hxviii, 198 pages
_z9781118987124
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119183440
938 _aAskews and Holts Library Services
_bASKH
_nAH27098969
938 _aAskews and Holts Library Services
_bASKH
_nAH27099455
938 _aBooks 24x7
_bB247
_nbks00080730
938 _aCoutts Information Services
_bCOUT
_n29652605
938 _aEBL - Ebook Library
_bEBLB
_nEBL4040351
938 _aEBSCOhost
_bEBSC
_n1023136
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_ncis29652605
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00621892
938 _aYBP Library Services
_bYANK
_n12522592
938 _aYBP Library Services
_bYANK
_n12673795
938 _aYBP Library Services
_bYANK
_n12580749
994 _a92
_bINLUM
999 _c12244
_d12244