|
|
|
|
LEADER |
00000cam a22000001i 4500 |
001 |
OR_on1125076529 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m d |
007 |
cr ||||||||||| |
008 |
151207s2016 flua o 000 0 eng d |
040 |
|
|
|a UKMGB
|b eng
|e rda
|e pn
|c UKMGB
|d OCLCO
|d OCLCF
|d OCLCO
|
015 |
|
|
|a GBB5H8066
|2 bnb
|
016 |
7 |
|
|a 017656344
|2 Uk
|
020 |
|
|
|a 9781498702201
|q (PDF ebook) :
|
020 |
|
|
|a 1498702201
|
020 |
|
|
|z 9781498702195 (hbk.)
|
029 |
0 |
|
|a UKMGB
|b 017656344
|
029 |
1 |
|
|a AU@
|b 000060010205
|
035 |
|
|
|a (OCoLC)1125076529
|
037 |
|
|
|a TANDF_381823
|b Ingram Content Group
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mohammed, Mohssen,
|d 1982-
|e author.
|
245 |
1 |
0 |
|a Honeypots and routers :
|b collecting internet attacks /
|c Mohssen Mohammed and Habib-ur Rehman.
|
250 |
|
|
|a 1st.
|
264 |
|
1 |
|a Boca Raton :
|b Auerbach,
|c 2016.
|
300 |
|
|
|a 1 online resource :
|b illustrations (black and white).
|
336 |
|
|
|a text
|2 rdacontent
|
336 |
|
|
|a still image
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
500 |
|
|
|a <P><STRONG>Computer Networks<BR></STRONG>Devices<BR>Medium<BR>Network Topology<BR>Network Protocols and Standards<BR>Common Network Protocols<BR>References<BR><BR><B>Information System Security<BR></B>CIA Triad<BR>Parkerian Hexad<BR>Model for Information Assurance <BR>Reference Model of Information Assurance and Security<BR>Fundamentals of Hacking<BR>References<BR><BR><B>Intrusions and Vulnerabilities<BR></B>Network Vulnerability List<BR>Operating System Vulnerability List<BR>References<BR><BR><B>Malware<BR></B>Introduction<BR>Computer Viruses<BR>Computer Worms <BR>Worm Component<BR>Worm Examples <BR>Polymorphic Worms: Definition and Anatomy<BR>Prevention and Detection of Worms<BR>Intrusion Detection Systems<BR>Firewalls <BR>References <BR><BR><B>Honeypots<BR></B>Definition and History of Honeypots<BR>Types of Threats<BR>Value of Honeypots<BR>Honeypot Types Based on Interaction Level<BR>Overview of Five Honeypots<BR>Conclusion<BR>References <BR><BR><B>Security Systems<BR></B>Firewall<BR>Antivirus<BR>Intrusion Detection and Prevention Systems<BR>References <BR><BR><B>Zero-Day Polymorphic Worms Collection Method<BR></B>Motivation of Double-Honeynet System<BR>Double-Honeynet Architecture<BR>Software <BR>Double-Honeynet System Configurations <BR>Summary <BR>References<BR></P>
|
588 |
|
|
|a Description based on CIP data; item not viewed.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
700 |
1 |
|
|a Rehman, Habib-ur,
|e author.
|
776 |
0 |
8 |
|i Print version :
|z 9781498702195
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781498702201/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|