Cargando…

Client-Honeypots : Exploring Malicious Websites /

This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Göbel, Jan Gerrit
Otros Autores: Dewald, Andreas
Formato: Electrónico eBook
Idioma:Inglés
Publicado: München : Oldenbourg Verlog, ©2011.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn903850044
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 140510s2011 gw o 000 0 eng d
040 |a YDXCP  |b eng  |e pn  |c YDXCP  |d OCLCO  |d EBLCP  |d MHW  |d DEBSZ  |d N$T  |d OCLCF  |d OCLCQ  |d AGLDB  |d ZCU  |d MERUC  |d OCLCQ  |d VTS  |d ICG  |d OCLCQ  |d STF  |d DKC  |d OCLCQ  |d M8D  |d OCLCQ  |d AJS  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 879550638  |a 1112883046 
020 |a 9783486711516  |q (electronic bk.) 
020 |a 3486711512  |q (electronic bk.) 
029 1 |a DEBBG  |b BV043787495 
029 1 |a DEBBG  |b BV044062928 
029 1 |a DEBSZ  |b 407697411 
029 1 |a DEBSZ  |b 415537770 
029 1 |a DEBSZ  |b 472862758 
035 |a (OCoLC)903850044  |z (OCoLC)879550638  |z (OCoLC)1112883046 
050 4 |a QA76.9.A25  |b G63 2011 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Göbel, Jan Gerrit. 
245 1 0 |a Client-Honeypots :  |b Exploring Malicious Websites /  |c by Jan Gerrit Göbel and Andreas Dewald ; with a foreword by Felix Freiling. 
260 |a München :  |b Oldenbourg Verlog,  |c ©2011. 
300 |a 1 online resource (236 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information. 
588 0 |a Online resource; title from digital title page (viewed on June 18, 2014). 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
700 1 |a Dewald, Andreas. 
758 |i has work:  |a Client-honeypots (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGQQJ4WPtgM3PjH6cpwCFC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Göbel, Jan Gerrit.  |t Client-Honeypots : Exploring Malicious Websites.  |d München : De Gruyter, ©2011  |z 9783486705263 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1348689  |z Texto completo 
936 |a BATCHLOAD 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1348689 
938 |a EBSCOhost  |b EBSC  |n 757556 
938 |a YBP Library Services  |b YANK  |n 10914479 
994 |a 92  |b IZTAP