Cargando…

Zero day exploit : countdown to darkness /

The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every m...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Shein, Rob
Otros Autores: Sachs, Marcus H.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress, ©2004.
Colección:Cyber-Fiction Ser.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocm56406331
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 040901s2004 mau o 000 f eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d BAKER  |d YDXCP  |d OCLCQ  |d OCLCO  |d OCLCQ  |d NTG  |d BTCTA  |d NZAUC  |d E7B  |d EBLCP  |d ZCU  |d DEBBG  |d OPELS  |d CO3  |d OCLCF  |d OCLCA  |d OCLCQ  |d OCLCO  |d NLGGC  |d OCLCQ  |d OCL  |d DEBSZ  |d OCLCQ  |d N$T  |d AGLDB  |d OCLCA  |d STF  |d D6H  |d OCLCQ  |d VTS  |d INT  |d OCLCQ  |d G3B  |d LEAUB  |d OL$  |d VLY  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 57367729  |a 85854844  |a 144559456  |a 162720940  |a 507796689  |a 646719742  |a 905666909  |a 961601673  |a 962719596 
020 |a 1932266763  |q (electronic bk.) 
020 |a 9781932266764  |q (electronic bk.) 
020 |a 1931836094 
020 |a 9781931836098 
020 |a 9780080543925  |q (electronic bk.) 
020 |a 0080543928  |q (electronic bk.) 
029 1 |a AU@  |b 000026760614 
029 1 |a AU@  |b 000054156996 
029 1 |a CHNEW  |b 001004716 
029 1 |a DEBBG  |b BV039832462 
029 1 |a DEBBG  |b BV042307359 
029 1 |a DEBBG  |b BV043123136 
029 1 |a DEBSZ  |b 405314809 
029 1 |a DEBSZ  |b 422371548 
029 1 |a NZ1  |b 12435735 
029 1 |a NZ1  |b 15190334 
029 1 |a NZ1  |b 8743906 
035 |a (OCoLC)56406331  |z (OCoLC)57367729  |z (OCoLC)85854844  |z (OCoLC)144559456  |z (OCoLC)162720940  |z (OCoLC)507796689  |z (OCoLC)646719742  |z (OCoLC)905666909  |z (OCoLC)961601673  |z (OCoLC)962719596 
050 4 |a PS3619.H45  |b Z47 2004eb 
072 7 |a FIC  |x 000000  |2 bisacsh 
082 0 4 |a 813.6  |2 22 
049 |a UAMI 
100 1 |a Shein, Rob. 
245 1 0 |a Zero day exploit :  |b countdown to darkness /  |c Rob Shein ; Marcus H. Sachs, technical editor. 
260 |a Rockland, MA :  |b Syngress,  |c ©2004. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Cyber-Fiction Ser. 
500 |a "Rob Shein aka Rogue Shoten." 
500 |a Title from e-book title screen (viewed September 1, 2004). 
500 |a "Foreword by David Litchfield."--E-book 'cover' page 
520 |a The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community 
505 0 |a Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security  |v Fiction. 
650 0 |a Hackers  |v Fiction. 
650 0 |a Computer networks  |x Security measures  |v Fiction. 
650 6 |a Sécurité informatique  |v Romans, nouvelles, etc. 
650 6 |a Pirates informatiques  |v Romans, nouvelles, etc. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Romans, nouvelles, etc. 
650 7 |a FICTION  |x General.  |2 bisacsh 
650 7 |a Hackers  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
655 2 |a Fictional Work 
655 7 |a Fiction  |2 fast 
655 7 |a Fiction.  |2 lcgft 
655 7 |a Romans.  |2 rvmgf 
700 1 |a Sachs, Marcus H. 
776 0 8 |i Print version:  |a Shein, Rob.  |t Zero day exploit.  |d Rockland, MA : Syngress, ©2004  |z 9781931836098  |w (OCoLC)58728380 
830 0 |a Cyber-Fiction Ser. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=114702  |z Texto completo 
938 |a Baker & Taylor  |b BKTY  |c 49.95  |d 49.95  |i 1932266763  |n 0006210552  |s active  |z B&T Title: Cisco Voice Over Ip Security 
938 |a Baker and Taylor  |b BTCP  |n BK0006210552 
938 |a ebrary  |b EBRY  |n ebr10062347 
938 |a EBSCOhost  |b EBSC  |n 114702 
938 |a YBP Library Services  |b YANK  |n 2166734 
994 |a 92  |b IZTAP