|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn613958929 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
100513s2010 maua o 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d CDX
|d YDXCP
|d OCLCQ
|d N$T
|d EBLCP
|d MHW
|d E7B
|d OCLCQ
|d REDDC
|d OCLCQ
|d DEBSZ
|d VLB
|d OCLCQ
|d UMI
|d TEFOD
|d OCLCF
|d OCLCQ
|d CNSPO
|d TEFOD
|d OCLCQ
|d COO
|d OCLCQ
|d LIV
|d MERUC
|d OCLCQ
|d OCLCA
|d D6H
|d CEF
|d OCLCQ
|d WYU
|d LEAUB
|d OL$
|d OCLCQ
|d BRF
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB002365
|2 bnb
|
016 |
7 |
|
|a 015455626
|2 Uk
|
019 |
|
|
|a 664572179
|a 852502075
|a 872685181
|a 1065647637
|a 1102536587
|
020 |
|
|
|a 9781597495547
|q (electronic bk.)
|
020 |
|
|
|a 1597495549
|q (electronic bk.)
|
020 |
|
|
|z 9781597495530
|
020 |
|
|
|z 1597495530
|
029 |
1 |
|
|a AU@
|b 000045963892
|
029 |
1 |
|
|a AU@
|b 000051525072
|
029 |
1 |
|
|a AU@
|b 000052007953
|
029 |
1 |
|
|a CHBIS
|b 006513801
|
029 |
1 |
|
|a CHNEW
|b 000616893
|
029 |
1 |
|
|a CHNEW
|b 001009665
|
029 |
1 |
|
|a CHVBK
|b 174733887
|
029 |
1 |
|
|a DEBBG
|b BV041430910
|
029 |
1 |
|
|a DEBBG
|b BV042300683
|
029 |
1 |
|
|a DEBSZ
|b 372889034
|
029 |
1 |
|
|a DEBSZ
|b 398267278
|
029 |
1 |
|
|a DEBSZ
|b 399119256
|
029 |
1 |
|
|a DEBSZ
|b 430881339
|
029 |
1 |
|
|a GBVCP
|b 785368973
|
029 |
1 |
|
|a NZ1
|b 13448981
|
029 |
1 |
|
|a NZ1
|b 15187743
|
029 |
1 |
|
|a AU@
|b 000060066075
|
029 |
1 |
|
|a AU@
|b 000066232550
|
029 |
1 |
|
|a AU@
|b 000067100292
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:9910110661305765
|
035 |
|
|
|a (OCoLC)613958929
|z (OCoLC)664572179
|z (OCoLC)852502075
|z (OCoLC)872685181
|z (OCoLC)1065647637
|z (OCoLC)1102536587
|
037 |
|
|
|a 1094143:10886651
|b Elsevier Science & Technology
|n http://www.sciencedirect.com
|
037 |
|
|
|a C3296CC8-C6C8-4C6F-A824-43CDCBA9B78B
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|b A52 2010
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Anderson, Brian
|q (Brian James)
|
245 |
1 |
0 |
|a Seven deadliest USB attacks /
|c Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie.
|
260 |
|
|
|a Burlington, MA :
|b Syngress,
|c ©2010.
|
300 |
|
|
|a 1 online resource (xiv, 222 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Syngress seven deadliest attacks series
|
520 |
|
|
|a Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdump Pod Slurping Social Engineering and USB Technology Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
|
505 |
0 |
|
|a Introduction -- Chapter 1: USB Hacksaw -- Chapter 2: USB Switchblade -- Chapter 3: USB Based Virus / Malicious Code Launch -- Chapter 4: USB Device OverFlow -- Chapter 5: USB Ramdump -- Chapter 6: Podslurping-A USB Problem -- Chapter 7: Social Engineering and USB Come Together for a Brutal Attack.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Anderson, Brian (Brian James).
|t Seven deadliest USB attacks.
|d Burlington, MA : Syngress, ©2010
|z 9781597495530
|z 1597495530
|w (DLC) 2010008745
|w (OCoLC)460058991
|
830 |
|
0 |
|a Syngress seven deadliest attacks series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597495547/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 14948507
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL566717
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10408190
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 334695
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3250470
|
994 |
|
|
|a 92
|b IZTAP
|