|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn808345305 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
160618s2012 inua o 001 0 eng |
010 |
|
|
|a 2016299605
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d E7B
|d B24X7
|d COO
|d YDXCP
|d UMI
|d ITD
|d CHVBK
|d DEBSZ
|d OCLCF
|d AZK
|d LOA
|d OCLCO
|d OCLCA
|d MOR
|d PIFAG
|d LIV
|d OCLCQ
|d OCLCA
|d OCL
|d STF
|d WRM
|d LND
|d COCUF
|d CEF
|d INT
|d NRAMU
|d VT2
|d AU@
|d OCLCQ
|d WYU
|d OCLCQ
|d BOL
|d UKBTH
|d VLY
|d UKAHL
|d TAC
|d OCLCO
|d OCLCQ
|d TOH
|d OCLCQ
|d OCLCO
|
016 |
7 |
|
|a 016009803
|2 Uk
|
019 |
|
|
|a 843945968
|a 870418702
|a 961487118
|a 962622624
|a 966211544
|a 988441905
|a 992061748
|a 1037705902
|a 1038569751
|a 1044410125
|a 1045521948
|a 1056397174
|a 1058126683
|a 1060903389
|a 1065657075
|a 1074325933
|a 1083237033
|a 1114465388
|a 1159655384
|a 1162308203
|a 1295600398
|a 1300579319
|a 1302704663
|a 1303348955
|
020 |
|
|
|a 9781118239568
|q (ebk)
|
020 |
|
|
|a 1118239563
|q (ebk)
|
020 |
|
|
|a 9781118264188
|q (ebk)
|
020 |
|
|
|a 1118264185
|q (ebk)
|
020 |
|
|
|a 9781118226254
|q (ebk)
|
020 |
|
|
|a 1118226259
|q (ebk)
|
020 |
|
|
|a 1280679085
|
020 |
|
|
|a 9781280679087
|
020 |
|
|
|a 9786613656018
|
020 |
|
|
|a 6613656011
|
020 |
|
|
|z 9781118166130
|
020 |
|
|
|z 1118166132
|
024 |
8 |
|
|a 9781118239568
|
029 |
1 |
|
|a AU@
|b 000051433089
|
029 |
1 |
|
|a AU@
|b 000053026141
|
029 |
1 |
|
|a AU@
|b 000057677674
|
029 |
1 |
|
|a AU@
|b 000067094676
|
029 |
1 |
|
|a CHNEW
|b 000602667
|
029 |
1 |
|
|a DEBBG
|b BV041121882
|
029 |
1 |
|
|a DEBSZ
|b 396768105
|
029 |
1 |
|
|a NZ1
|b 14693633
|
035 |
|
|
|a (OCoLC)808345305
|z (OCoLC)843945968
|z (OCoLC)870418702
|z (OCoLC)961487118
|z (OCoLC)962622624
|z (OCoLC)966211544
|z (OCoLC)988441905
|z (OCoLC)992061748
|z (OCoLC)1037705902
|z (OCoLC)1038569751
|z (OCoLC)1044410125
|z (OCoLC)1045521948
|z (OCoLC)1056397174
|z (OCoLC)1058126683
|z (OCoLC)1060903389
|z (OCoLC)1065657075
|z (OCoLC)1074325933
|z (OCoLC)1083237033
|z (OCoLC)1114465388
|z (OCoLC)1159655384
|z (OCoLC)1162308203
|z (OCoLC)1295600398
|z (OCoLC)1300579319
|z (OCoLC)1302704663
|z (OCoLC)1303348955
|
037 |
|
|
|a CL0500000217
|b Safari Books Online
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a JZ5588
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Jackson, Gary M.
|
245 |
1 |
0 |
|a Predicting malicious behavior :
|b tools and techniques for ensuring global security /
|c Gary M. Jackson.
|
264 |
|
1 |
|a Indianapolis, IN :
|b John Wiley and Sons,
|c [2012]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
340 |
|
|
|g polychrome.
|2 rdacc
|0 http://rdaregistry.info/termList/RDAColourContent/1003
|
347 |
|
|
|a data file
|
500 |
|
|
|a Includes index.
|
500 |
|
|
|a Accompanying DVD-ROM contains video demonstrations and program files.
|
505 |
0 |
|
|a pt. 1. Understanding the Dark Side: Malicious Intent -- pt. 2. Dissecting Malicious Behavior -- pt. 3. Applying Tools and Methods -- pt. 4. Predicting Malicious Behavior: Tools and Methods to Support a Paradigm Shift in Security.
|
588 |
0 |
|
|a Print version record and CIP data provided by publisher.
|
520 |
8 |
|
|a A groundbreaking exploration of how to identify and fight security threats at every level, this revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more.
|
542 |
|
|
|f Copyright © John Wiley & Sons
|g 2012
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Security, International
|x Data processing.
|
650 |
|
0 |
|a Terrorism
|x Prevention
|x Data processing.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Behavioral assessment.
|
650 |
|
0 |
|a Criminal behavior, Prediction of
|x Data processing.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Terrorisme
|x Prévention
|x Informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Analyse comportementale.
|
650 |
|
7 |
|a Behavioral assessment
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Security, International
|x Data processing
|2 fast
|
650 |
|
7 |
|a Computervirus
|2 gnd
|
650 |
|
7 |
|a Datensicherung
|2 gnd
|
776 |
0 |
8 |
|i Print version:
|a Jackson, Gary M.
|t Predicting malicious behavior.
|d Indianapolis, IN : John Wiley, [2012]
|z 9781118166130
|w (DLC) 2012933633
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781118239568/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH21629947
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00046202
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10580234
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7660239
|
994 |
|
|
|a 92
|b IZTAP
|