Cargando…

Seven deadliest USB attacks /

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. Y...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Anderson, Brian (Brian James)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress, ©2010.
Colección:Syngress seven deadliest attacks series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn613958929
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 100513s2010 maua o 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d CDX  |d YDXCP  |d OCLCQ  |d N$T  |d EBLCP  |d MHW  |d E7B  |d OCLCQ  |d REDDC  |d OCLCQ  |d DEBSZ  |d VLB  |d OCLCQ  |d UMI  |d TEFOD  |d OCLCF  |d OCLCQ  |d CNSPO  |d TEFOD  |d OCLCQ  |d COO  |d OCLCQ  |d LIV  |d MERUC  |d OCLCQ  |d OCLCA  |d D6H  |d CEF  |d OCLCQ  |d WYU  |d LEAUB  |d OL$  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB002365  |2 bnb 
016 7 |a 015455626  |2 Uk 
019 |a 664572179  |a 852502075  |a 872685181  |a 1065647637  |a 1102536587 
020 |a 9781597495547  |q (electronic bk.) 
020 |a 1597495549  |q (electronic bk.) 
020 |z 9781597495530 
020 |z 1597495530 
029 1 |a AU@  |b 000045963892 
029 1 |a AU@  |b 000051525072 
029 1 |a AU@  |b 000052007953 
029 1 |a CHBIS  |b 006513801 
029 1 |a CHNEW  |b 000616893 
029 1 |a CHNEW  |b 001009665 
029 1 |a CHVBK  |b 174733887 
029 1 |a DEBBG  |b BV041430910 
029 1 |a DEBBG  |b BV042300683 
029 1 |a DEBSZ  |b 372889034 
029 1 |a DEBSZ  |b 398267278 
029 1 |a DEBSZ  |b 399119256 
029 1 |a DEBSZ  |b 430881339 
029 1 |a GBVCP  |b 785368973 
029 1 |a NZ1  |b 13448981 
029 1 |a NZ1  |b 15187743 
029 1 |a AU@  |b 000060066075 
029 1 |a AU@  |b 000066232550 
029 1 |a AU@  |b 000067100292 
029 1 |a DKDLA  |b 820120-katalog:9910110661305765 
035 |a (OCoLC)613958929  |z (OCoLC)664572179  |z (OCoLC)852502075  |z (OCoLC)872685181  |z (OCoLC)1065647637  |z (OCoLC)1102536587 
037 |a 1094143:10886651  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
037 |a C3296CC8-C6C8-4C6F-A824-43CDCBA9B78B  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b A52 2010 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Anderson, Brian  |q (Brian James) 
245 1 0 |a Seven deadliest USB attacks /  |c Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie. 
260 |a Burlington, MA :  |b Syngress,  |c ©2010. 
300 |a 1 online resource (xiv, 222 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Syngress seven deadliest attacks series 
520 |a Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdump Pod Slurping Social Engineering and USB Technology Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable. 
505 0 |a Introduction -- Chapter 1: USB Hacksaw -- Chapter 2: USB Switchblade -- Chapter 3: USB Based Virus / Malicious Code Launch -- Chapter 4: USB Device OverFlow -- Chapter 5: USB Ramdump -- Chapter 6: Podslurping-A USB Problem -- Chapter 7: Social Engineering and USB Come Together for a Brutal Attack. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
776 0 8 |i Print version:  |a Anderson, Brian (Brian James).  |t Seven deadliest USB attacks.  |d Burlington, MA : Syngress, ©2010  |z 9781597495530  |z 1597495530  |w (DLC) 2010008745  |w (OCoLC)460058991 
830 0 |a Syngress seven deadliest attacks series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597495547/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Coutts Information Services  |b COUT  |n 14948507 
938 |a EBL - Ebook Library  |b EBLB  |n EBL566717 
938 |a ebrary  |b EBRY  |n ebr10408190 
938 |a EBSCOhost  |b EBSC  |n 334695 
938 |a YBP Library Services  |b YANK  |n 3250470 
994 |a 92  |b IZTAP