Cargando…

Syngress force emerging threat analysis : from mischief to malicious /

A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrows Threats Today This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of I...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Maynor, David
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress Pub., ©2006.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn162131403
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 070802s2006 maua o 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OPELS  |d OCLCQ  |d N$T  |d YDXCP  |d ZCU  |d N15  |d E7B  |d DKDLA  |d B24X7  |d UMI  |d OCLCO  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d MUX  |d TEU  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d COO  |d OCLCO  |d OCLCQ  |d OCLCO  |d AGLDB  |d OCLCQ  |d JBG  |d OCLCA  |d D6H  |d UAB  |d OCLCQ  |d VTS  |d CEF  |d STF  |d LEAUB  |d VT2  |d BRF  |d EYM  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 86078759  |a 154664175  |a 181842670  |a 466943647  |a 507575455  |a 647612983  |a 765142696  |a 824876116  |a 856958657  |a 1060198137  |a 1153025206  |a 1179676182  |a 1194788699 
020 |a 9781597490566 
020 |a 1597490563 
020 |a 9781429458191  |q (electronic bk.) 
020 |a 1429458194  |q (electronic bk.) 
020 |a 9780080475592 
020 |a 0080475590 
020 |a 9781597491587  |q (electronic bk. ;  |q Adobe Reader) 
020 |a 1597491586  |q (electronic bk. ;  |q Adobe Reader) 
029 1 |a AU@  |b 000050492584 
029 1 |a AU@  |b 000051559569 
029 1 |a AU@  |b 000051860179 
029 1 |a AU@  |b 000053225347 
029 1 |a CHBIS  |b 005827900 
029 1 |a CHNEW  |b 001006036 
029 1 |a CHVBK  |b 168583682 
029 1 |a DEBBG  |b BV041119863 
029 1 |a DEBBG  |b BV042314163 
029 1 |a DEBBG  |b BV043044054 
029 1 |a DEBSZ  |b 396677495 
029 1 |a DEBSZ  |b 405304609 
029 1 |a DEBSZ  |b 422237876 
029 1 |a NZ1  |b 11778285 
029 1 |a NZ1  |b 15189212 
035 |a (OCoLC)162131403  |z (OCoLC)86078759  |z (OCoLC)154664175  |z (OCoLC)181842670  |z (OCoLC)466943647  |z (OCoLC)507575455  |z (OCoLC)647612983  |z (OCoLC)765142696  |z (OCoLC)824876116  |z (OCoLC)856958657  |z (OCoLC)1060198137  |z (OCoLC)1153025206  |z (OCoLC)1179676182  |z (OCoLC)1194788699 
037 |a 132624:132744  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a QA76.9.A25  |b S975 2006eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Syngress force emerging threat analysis :  |b from mischief to malicious /  |c David Maynor [and others]. 
246 3 0 |a Emerging threat analysis 
246 1 4 |a Syngress force 2006 emerging threat analysis : from mischief to malicious 
260 |a Rockland, MA :  |b Syngress Pub.,  |c ©2006. 
300 |a 1 online resource (xxx, 610 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrows Threats Today This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the best of this years top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future. * From Practical VoIP Security, Thomas Porter, Ph. D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security. * From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents the latest information on phishing and spam. * From Combating Spyware in the Enterprise, Brian Baskin, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and removal of spyware. * Also from Combating Spyware in the Enterprise, About.coms security expert Tony Bradley covers the transformation of spyware. * From Inside the SPAM Cartel, Spammer-X shows how spam is created and why it works so well. * From Securing IM and P2P Applications for the Enterprise, Paul Piccard, former manager of Internet Security Systems' Global Threat Operations Center, covers Skype security. * Also from Securing IM and P2P Applications for the Enterprise, Craig Edwards, creator of the IRC security software IRC Defender, discusses global IRC security. * From RFID Security, Brad Renderman Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application attacks. * Also from RFID Security, Frank Thornton, owner of Blackthorn Systems and an expert in wireless networks, discusses management of RFID security. * From Hack the Stack, security expert Michael Gregg covers attacking the people layer. * Bonus coverage includes exclusive material on device driver attacks by Dave Maynor, Senior Researcher at SecureWorks. * The best of this year: Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats * Complete Coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more * Covers secure enterprise-wide deployment of hottest technologies including Voice Over IP, Pocket PCs, smart phones, and more. 
505 0 |a Chapter 1: Analysis of Future Threat Levels Chapter 2: Pocket PCs and Smart Phones Chapter 3: Bots and Bot Networks Chapter 4: Malware Attacks Chapter 5: VoIP and SPIT Chapter 6: Compromising Security Software Chapter 7: Attacking and Defending Embedded Devices Chapter 8: DMA Attacks Chapter 9: Second-Tier and Seeded Landscape Attacks Chapter 10: How Vulnerable are SCADA Systems? 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer crimes  |x Prevention. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Maynor, David. 
776 0 8 |i Print version:  |t Syngress force emerging threat analysis.  |d Rockland, MA : Syngress Pub., ©2006  |z 1597490563  |z 9781597490566  |w (OCoLC)76941056 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=174833  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00014079 
938 |a ebrary  |b EBRY  |n ebr10150169 
938 |a EBSCOhost  |b EBSC  |n 174833 
938 |a YBP Library Services  |b YANK  |n 2537838 
938 |a YBP Library Services  |b YANK  |n 2585992 
938 |a YBP Library Services  |b YANK  |n 2712428 
994 |a 92  |b IZTAP