|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn297576318 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090109s2008 njua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d MKN
|d CEF
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d CNNAI
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d YDX
|d OCLCA
|d OCLCQ
|d AU@
|d OCLCQ
|d UKAHL
|d INARC
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 244006777
|a 1044278719
|a 1056353428
|a 1058389220
|a 1060848978
|a 1073060622
|a 1097090489
|a 1285467772
|
020 |
|
|
|a 9780321553744
|
020 |
|
|
|a 0321553748
|
020 |
|
|
|a 0321501950
|q (print)
|
020 |
|
|
|a 9780321501950
|q (print)
|
029 |
1 |
|
|a AU@
|b 000067110153
|
029 |
1 |
|
|a CHBIS
|b 006150032
|
029 |
1 |
|
|a CHVBK
|b 171270428
|
029 |
1 |
|
|a DEBSZ
|b 355405830
|
029 |
1 |
|
|a HEBIS
|b 291478565
|
029 |
1 |
|
|a AU@
|b 000057276333
|
035 |
|
|
|a (OCoLC)297576318
|z (OCoLC)244006777
|z (OCoLC)1044278719
|z (OCoLC)1056353428
|z (OCoLC)1058389220
|z (OCoLC)1060848978
|z (OCoLC)1073060622
|z (OCoLC)1097090489
|z (OCoLC)1285467772
|
037 |
|
|
|a CL0500000030
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b C75 2008
|
082 |
0 |
4 |
|a 364.168 J25 2008 [ONLINE]
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Jakobsson, Markus.
|
245 |
1 |
0 |
|a Crimeware :
|b understanding new attacks and defenses /
|c Markus Jakobsson, Zulfikar Ramzan.
|
260 |
|
|
|a Upper Saddle River, N.J. :
|b Addison-Wesley,
|c ©2008.
|
300 |
|
|
|a 1 online resource (xxi, 582 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pages 525-556) and index.
|
505 |
0 |
|
|a Overview of crimeware -- A taxonomy of coding errors -- Crimeware and peer-to-peer networks -- Crimeware in small devices -- Crimeware in firmware -- Crimeware in the browser -- Bot networks -- Rootkits -- Virtual worlds and fraud -- Cybercrime and politics -- Online advertising fraud -- Crimeware business models -- The educational aspect of security -- Surreptitious code and the law -- Crimeware and trusted computing -- Technical defense techniques -- The future of crimeware.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer crimes.
|2 blmlsh
|
650 |
|
7 |
|a Computer crimes.
|2 fast
|0 (OCoLC)fst00872063
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426
|
700 |
1 |
|
|a Ramzan, Zulfikar.
|
776 |
0 |
|
|z 0321501950
|
776 |
0 |
|
|z 9780321501950
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780321553744/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37824549
|
938 |
|
|
|a Internet Archive
|b INAR
|n crimewareunderst0000unse
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14879656
|
994 |
|
|
|a 92
|b IZTAP
|