Cargando…

Infosecurity 2008 threat analysis /

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warn...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Clark, Champ, III
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress Pub., ©2008.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn281598632
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 081212s2008 maua o 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OPELS  |d OCLCQ  |d N$T  |d EBLCP  |d IDEBK  |d E7B  |d OCLCO  |d UMI  |d DEBSZ  |d OCLCQ  |d OCLCF  |d OCLCQ  |d AGLDB  |d MERUC  |d OCLCQ  |d JBG  |d OCLCA  |d VTS  |d CEF  |d OCLCQ  |d WYU  |d STF  |d LEAUB  |d OCLCQ  |d K6U  |d VT2  |d VLY  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 436228297  |a 505068737  |a 646747424  |a 824140483  |a 1062896290  |a 1156389794  |a 1162414283  |a 1192342659  |a 1240534333 
020 |a 9781597492249 
020 |a 1597492248 
020 |a 9780080558691  |q (electronic bk.) 
020 |a 0080558690  |q (electronic bk.) 
020 |a 1281273317 
020 |a 9781281273314 
020 |a 9786611273316 
020 |a 661127331X 
029 1 |a AU@  |b 000050492547 
029 1 |a AU@  |b 000051557483 
029 1 |a AU@  |b 000060062010 
029 1 |a CHBIS  |b 006041600 
029 1 |a CHNEW  |b 001007793 
029 1 |a CHVBK  |b 199628343 
029 1 |a DEBBG  |b BV041119735 
029 1 |a DEBBG  |b BV042305765 
029 1 |a DEBBG  |b BV043043884 
029 1 |a DEBSZ  |b 396676189 
029 1 |a DEBSZ  |b 407380485 
029 1 |a DEBSZ  |b 422125660 
029 1 |a DEBSZ  |b 430484887 
029 1 |a DKDLA  |b 820120-katalog:9910110109605765 
029 1 |a GBVCP  |b 785365435 
029 1 |a NZ1  |b 13068859 
029 1 |a NZ1  |b 15189706 
035 |a (OCoLC)281598632  |z (OCoLC)436228297  |z (OCoLC)505068737  |z (OCoLC)646747424  |z (OCoLC)824140483  |z (OCoLC)1062896290  |z (OCoLC)1156389794  |z (OCoLC)1162414283  |z (OCoLC)1192342659  |z (OCoLC)1240534333 
037 |a 149068:149219  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a QA76.9.D314  |b I565 2008eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Infosecurity 2008 threat analysis /  |c [authors, Champ Clark III [and others] ; foreword by Richard Ford. 
246 3 0 |a Threat analysis 
260 |a Burlington, MA :  |b Syngress Pub.,  |c ©2008. 
300 |a 1 online resource (xxiv, 442 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions. * Provides IT Security Professionals with a first look at likely new threats to their enterprise * Includes real-world examples of system intrusions and compromised data * Provides techniques and strategies to detect, prevent, and recover * Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence. 
505 0 |a Botnets : a call to action -- Botnets overview -- Cross-site scripting fundamentals -- XSS theory -- XSS attack methods -- Protecting critical infrastructure : process control and SCADA -- Final thoughts -- Why PCI is important -- Protect cardholder data -- Understanding and taking advantage of VoIP protocols -- Asterisk hardware ninjutsu -- Social engineering. 
588 0 |a Print version record. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Database security. 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 0 |a Computers  |x Access control. 
650 0 |a Telecommunication  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Télécommunications  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Database security  |2 fast 
650 7 |a Telecommunication  |x Security measures  |2 fast 
700 1 |a Clark, Champ,  |c III. 
776 0 8 |i Print version:  |t Infosecurity 2008 threat analysis.  |d Burlington, MA : Syngress Pub., ©2008  |z 1597492248  |z 9781597492249  |w (DLC) 2008270325  |w (OCoLC)170922388 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=227542  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597492249/?ar  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL338928 
938 |a ebrary  |b EBRY  |n ebr10229492 
938 |a EBSCOhost  |b EBSC  |n 227542 
994 |a 92  |b IZTAP