Cargando…

Infosecurity 2008 threat analysis /

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warn...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Clark, Champ, III
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress Pub., �2008.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn281598632
003 OCoLC
005 20231117015146.0
006 m o d
007 cr cn|||||||||
008 081212s2008 maua o 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OPELS  |d OCLCQ  |d N$T  |d EBLCP  |d IDEBK  |d E7B  |d OCLCO  |d UMI  |d DEBSZ  |d OCLCQ  |d OCLCF  |d OCLCQ  |d AGLDB  |d MERUC  |d OCLCQ  |d JBG  |d OCLCA  |d VTS  |d CEF  |d OCLCQ  |d WYU  |d STF  |d LEAUB  |d OCLCQ  |d K6U  |d VT2  |d VLY  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 436228297  |a 505068737  |a 646747424  |a 824140483  |a 1062896290  |a 1156389794  |a 1162414283  |a 1192342659  |a 1240534333 
020 |a 9781597492249 
020 |a 1597492248 
020 |a 9780080558691  |q (electronic bk.) 
020 |a 0080558690  |q (electronic bk.) 
020 |a 1281273317 
020 |a 9781281273314 
020 |a 9786611273316 
020 |a 661127331X 
035 |a (OCoLC)281598632  |z (OCoLC)436228297  |z (OCoLC)505068737  |z (OCoLC)646747424  |z (OCoLC)824140483  |z (OCoLC)1062896290  |z (OCoLC)1156389794  |z (OCoLC)1162414283  |z (OCoLC)1192342659  |z (OCoLC)1240534333 
050 4 |a QA76.9.D314  |b I565 2008eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
245 0 0 |a Infosecurity 2008 threat analysis /  |c [authors, Champ Clark III [and others] ; foreword by Richard Ford. 
246 3 0 |a Threat analysis 
260 |a Burlington, MA :  |b Syngress Pub.,  |c �2008. 
300 |a 1 online resource (xxiv, 442 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions. * Provides IT Security Professionals with a first look at likely new threats to their enterprise * Includes real-world examples of system intrusions and compromised data * Provides techniques and strategies to detect, prevent, and recover * Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence. 
505 0 |a Botnets : a call to action -- Botnets overview -- Cross-site scripting fundamentals -- XSS theory -- XSS attack methods -- Protecting critical infrastructure : process control and SCADA -- Final thoughts -- Why PCI is important -- Protect cardholder data -- Understanding and taking advantage of VoIP protocols -- Asterisk hardware ninjutsu -- Social engineering. 
588 0 |a Print version record. 
546 |a English. 
650 0 |a Database security. 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 0 |a Computers  |x Access control. 
650 0 |a Telecommunication  |x Security measures. 
650 2 |a Computer Security  |0 (DNLM)D016494 
650 6 |a Bases de donn�ees  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0220408 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 6 |a Protection de l'information (Informatique)  |0 (CaQQLa)201-0061151 
650 6 |a Ordinateurs  |x Acc�es  |x Contr�ole.  |0 (CaQQLa)201-0056439 
650 6 |a T�el�ecommunications  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0221593 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Computers  |x Access control  |2 fast  |0 (OCoLC)fst00872779 
650 7 |a Data protection  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Database security  |2 fast  |0 (OCoLC)fst00888063 
650 7 |a Telecommunication  |x Security measures  |2 fast  |0 (OCoLC)fst01145928 
700 1 |a Clark, Champ,  |c III. 
776 0 8 |i Print version:  |t Infosecurity 2008 threat analysis.  |d Burlington, MA : Syngress Pub., �2008  |z 1597492248  |z 9781597492249  |w (DLC) 2008270325  |w (OCoLC)170922388 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597492249  |z Texto completo