|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
JSTOR_ocn794491658 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
120509s2012 enk obf 000 0 eng d |
040 |
|
|
|a E7B
|b eng
|e pn
|c E7B
|d B24X7
|d OCLCO
|d DEBSZ
|d OCLCQ
|d N$T
|d OCLCQ
|d YDXCP
|d UMI
|d COO
|d JSTOR
|d OCLCF
|d OCLCO
|d MHW
|d MEAUC
|d WAU
|d IDEBK
|d OCL
|d OCLCQ
|d DEBBG
|d CUS
|d OCLCQ
|d AGLDB
|d LIV
|d OCLCQ
|d MERUC
|d OCLCQ
|d JBG
|d OCLCA
|d IOG
|d OCLCA
|d VTS
|d CEF
|d OCLCQ
|d LVT
|d STF
|d UAB
|d M8D
|d UKAHL
|d HS0
|d UX1
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 842891563
|a 843642499
|a 857717647
|a 900317338
|a 1175627118
|
020 |
|
|
|a 9781849283298
|q (electronic bk.)
|
020 |
|
|
|a 184928329X
|q (electronic bk.)
|
020 |
|
|
|a 9781849283304
|
020 |
|
|
|a 1849283303
|
020 |
|
|
|a 1299468659
|q (ebk)
|
020 |
|
|
|a 9781299468658
|q (ebk)
|
020 |
|
|
|z 1849283281
|
020 |
|
|
|z 9781849283281
|
029 |
1 |
|
|a AU@
|b 000052005936
|
029 |
1 |
|
|a CHNEW
|b 000602128
|
029 |
1 |
|
|a DEBBG
|b BV041432048
|
029 |
1 |
|
|a DEBBG
|b BV043093184
|
029 |
1 |
|
|a DEBSZ
|b 372709699
|
029 |
1 |
|
|a DEBSZ
|b 397540353
|
029 |
1 |
|
|a DEBSZ
|b 398279381
|
029 |
1 |
|
|a DEBSZ
|b 42125761X
|
029 |
1 |
|
|a AU@
|b 000067098076
|
029 |
1 |
|
|a AU@
|b 000069983997
|
035 |
|
|
|a (OCoLC)794491658
|z (OCoLC)842891563
|z (OCoLC)843642499
|z (OCoLC)857717647
|z (OCoLC)900317338
|z (OCoLC)1175627118
|
037 |
|
|
|a CL0500000277
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt4k5j6w
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|b L64 2012eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Loewengart, Victoria,
|e author.
|
245 |
1 |
3 |
|a An introduction to hacking and crimeware :
|b a pocket guide /
|c Victoria Loewengart.
|
260 |
|
|
|a Ely, Cambridgeshire :
|b IT Governance Pub.,
|c 2012.
|
300 |
|
|
|a 1 online resource (53 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Cover; Title; Copyright; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: Background; Chapter 2: Crimeware Products; "Zero Day" exploit toolkits; "Zeus"; "SpyEye"; "Darkness" DDoS botnet tool; Chapter 3: Unintentional Crimeware; SkyGrabber; Passware Kit; Maltego; Chapter 4: The Present and The Future; Chapter 5: Fighting Back; How to protect yourself from botnet infections; Active defense; Conclusion; Authoritative Sources Of Information; Bibliography; ITG Resources.
|
520 |
|
|
|a An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Computer security
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Internet
|x Security measures
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Computer crimes
|x Prevention
|v Handbooks, manuals, etc.
|
650 |
|
6 |
|a Sécurité informatique
|v Guides, manuels, etc.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures
|v Guides, manuels, etc.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|x Prevention.
|2 fast
|0 (OCoLC)fst00872068
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426
|
655 |
|
7 |
|a Handbooks and manuals.
|2 fast
|0 (OCoLC)fst01423877
|
776 |
0 |
8 |
|i Print version:
|a Loewengart, Victoria.
|t Introduction to hacking and crimeware.
|d IT Governance, 2012
|z 9781849283281
|w (OCoLC)778916004
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh6mx
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26135064
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00047053
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10554859
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 571576
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis25302578
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7627850
|
994 |
|
|
|a 92
|b IZTAP
|