|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1029878741 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180330s2017 flua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d STF
|d OCLCF
|d TOH
|d UOK
|d CEF
|d VT2
|d OCLCQ
|d DEBBG
|d G3B
|d S9I
|d UAB
|d SOE
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781498767897
|
020 |
|
|
|a 1498767893
|
020 |
|
|
|a 1498767869
|
020 |
|
|
|a 9781498767866
|
020 |
|
|
|a 1315350211
|
020 |
|
|
|a 9781315350219
|
020 |
|
|
|z 9781498767866
|
020 |
|
|
|z 9781315350219
|
035 |
|
|
|a (OCoLC)1029878741
|
037 |
|
|
|a CL0500000951
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Groom, Frank M.,
|e author.
|
245 |
1 |
0 |
|a Network and data security for non-engineers /
|c Frank M. Groom, Kevin Groom, Stephan S. Jones.
|
264 |
|
1 |
|a Boca Raton, FL :
|b CRC Press,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Introduction to security threats -- The 2014--2015 Anthem Blue Cross and Blue Shield break-in case study -- Anonymous persistent threats -- Creating secure code -- Providing a secure architecture -- The hacker strategy : expanded -- Malware, viruses, worms, bugs, and botnets -- Cryptography and the RSA algorithm -- Browser security and cross-site scripting-- Banking security, Zeus, and SpyEye -- Web application security -- Session management, user authentication, and web application security -- Web security, DNS security, and the internet -- Network security and defenses -- Network security protocols and defensive mechanisms -- Denial-of-service attacks -- Mobile platform security -- Cellular access security : 4G LTE, Mobile WiMAX, 5G, and MIMOs -- Wireless LAN security -- The Stuxnet Worm and the vulnerability of the U.S. electric power grid -- Cyber-warfare -- Conclusion.
|
520 |
|
|
|a Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
700 |
1 |
|
|a Groom, Kevin M.,
|e author.
|
700 |
1 |
|
|a Jones, Stephan,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Groom, Frank M.
|t Network and data security for non-engineers.
|d Boca Raton, FL : CRC Press, Taylor & Francis Group, [2017]
|z 9781498767866
|w (DLC) 2016008261
|w (OCoLC)947953996
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781315350219/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|