Cargando…

Network attacks and exploitation : a framework /

This book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Num...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Monte, Matthew (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Wiley, 2015.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn913742234
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu|||unuuu
008 150713s2015 inu ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d OCLCO  |d IDEBK  |d DEBSZ  |d OCLCO  |d BAL  |d YDXCP  |d DG1  |d OCLCO  |d CDX  |d STF  |d B24X7  |d OCLCF  |d OCLCO  |d COO  |d OCLCO  |d EBLCP  |d OCLCQ  |d DEBBG  |d BAL  |d RECBK  |d CCO  |d IDB  |d LOA  |d COCUF  |d DG1  |d K6U  |d LIP  |d PIFAG  |d FVL  |d ZCU  |d LIV  |d OCLCQ  |d MERUC  |d OCLCQ  |d OCLCA  |d U3W  |d OCLCA  |d D6H  |d OCLCQ  |d WRM  |d DEHBZ  |d ICG  |d VT2  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d UKAHL  |d AUD  |d OCLCQ  |d DCT  |d UKMGB  |d OCLCQ  |d UMI  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
015 |a GBB506838  |2 bnb 
016 7 |a 017011707  |2 Uk 
019 |a 959273207  |a 959873288  |a 1055392388  |a 1066426311  |a 1081220237  |a 1136155472  |a 1152976595  |a 1192346952  |a 1228605608 
020 |a 9781119183440  |q (electronic bk.) 
020 |a 1119183448  |q (electronic bk.) 
020 |a 9781118987087  |q (electronic bk.) 
020 |a 111898708X  |q (electronic bk.) 
020 |a 9781118987230 
020 |a 1118987233 
020 |a 1118987128 
020 |a 9781118987124 
020 |z 9781118987124 
029 1 |a AU@  |b 000056104417 
029 1 |a CHDSB  |b 006441166 
029 1 |a CHNEW  |b 000944523 
029 1 |a CHVBK  |b 339960892 
029 1 |a CHVBK  |b 480247595 
029 1 |a DEBBG  |b BV043397940 
029 1 |a DEBBG  |b BV043892434 
029 1 |a DEBSZ  |b 442835701 
029 1 |a DEBSZ  |b 468874771 
029 1 |a UKMGB  |b 017011707 
035 |a (OCoLC)913742234  |z (OCoLC)959273207  |z (OCoLC)959873288  |z (OCoLC)1055392388  |z (OCoLC)1066426311  |z (OCoLC)1081220237  |z (OCoLC)1136155472  |z (OCoLC)1152976595  |z (OCoLC)1192346952  |z (OCoLC)1228605608 
037 |a 9781118987230  |b Wiley 
050 4 |a HF5548.37  |b M665 2015eb 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658.4/78  |2 23 
049 |a UAMI 
100 1 |a Monte, Matthew,  |e author. 
245 1 0 |a Network attacks and exploitation :  |b a framework /  |c Matthew Monte. 
246 3 |a Network attacks & exploitation 
264 1 |a Indianapolis, IN :  |b Wiley,  |c 2015. 
264 4 |c ©2015 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed July 15, 2015). 
505 0 |a Computer Network Exploitation -- The Attacker -- The Defender -- Asymmetries -- Attacker Frictions -- Defender Frictions -- Offensive Strategy -- Defensive Strategy -- Offensive Case Studies. 
504 |a Includes bibliographical references and index. 
520 |a This book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. --  |c Edited summary from book. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Corporations  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Sociétés  |x Sécurité  |x Mesures. 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Corporations  |x Security measures  |2 fast 
758 |i has work:  |a Network attacks and exploitation (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCG7rjmQfMvtYVpHgmVKtDq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Monte, Matthew.  |t Network attacks & exploitation : a framework.  |d Indianapolis, Indiana : Wiley, ©2015  |h xviii, 198 pages  |z 9781118987124 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781118987124/?ar  |z Texto completo 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4040351  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH27098969 
938 |a Askews and Holts Library Services  |b ASKH  |n AH27099455 
938 |a Books 24x7  |b B247  |n bks00080730 
938 |a Coutts Information Services  |b COUT  |n 29652605 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4040351 
938 |a EBSCOhost  |b EBSC  |n 1023136 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis29652605 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00621892 
938 |a YBP Library Services  |b YANK  |n 12522592 
938 |a YBP Library Services  |b YANK  |n 12673795 
938 |a YBP Library Services  |b YANK  |n 12580749 
994 |a 92  |b IZTAP