Seven deadliest USB attacks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress
©2010
|
Schriftenreihe: | Syngress seven deadliest attacks series
|
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042300683 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781597495547 |c electronic bk. |9 978-1-59749-554-7 | ||
020 | |a 1597495549 |c electronic bk. |9 1-59749-554-9 | ||
020 | |a 9781597495530 |9 978-1-59749-553-0 | ||
020 | |a 1597495530 |9 1-59749-553-0 | ||
035 | |a (ZDB-33-EBS)ocn613958929 | ||
035 | |a (OCoLC)613958929 | ||
035 | |a (DE-599)BVBBV042300683 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Anderson, Brian, (Brian James) |e Verfasser |4 aut | |
245 | 1 | 0 | |a Seven deadliest USB attacks |c Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie |
264 | 1 | |a Burlington, MA |b Syngress |c ©2010 | |
300 | |a 1 Online-Ressource (xiv, 222 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Syngress seven deadliest attacks series | |
500 | |a Includes index | ||
500 | |a Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdump Pod Slurping Social Engineering and USB Technology Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable | ||
650 | 4 | |a Computer networks | |
650 | 4 | |a Security measures | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a USB (Computer bus) | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597495530 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027737675 |
Datensatz im Suchindex
_version_ | 1804152878371176448 |
---|---|
any_adam_object | |
author | Anderson, Brian, (Brian James) |
author_facet | Anderson, Brian, (Brian James) |
author_role | aut |
author_sort | Anderson, Brian, (Brian James) |
author_variant | b b j a bbj bbja |
building | Verbundindex |
bvnumber | BV042300683 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn613958929 (OCoLC)613958929 (DE-599)BVBBV042300683 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02923nmm a2200565zc 4500</leader><controlfield tag="001">BV042300683</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495547</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-554-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495549</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-554-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495530</subfield><subfield code="9">978-1-59749-553-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495530</subfield><subfield code="9">1-59749-553-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn613958929</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)613958929</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042300683</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Anderson, Brian, (Brian James)</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Seven deadliest USB attacks</subfield><subfield code="c">Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">©2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 222 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Syngress seven deadliest attacks series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdump Pod Slurping Social Engineering and USB Technology Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">USB (Computer bus)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495530</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027737675</subfield></datafield></record></collection> |
id | DE-604.BV042300683 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:42Z |
institution | BVB |
isbn | 9781597495547 1597495549 9781597495530 1597495530 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027737675 |
oclc_num | 613958929 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xiv, 222 pages) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Syngress |
record_format | marc |
series2 | Syngress seven deadliest attacks series |
spelling | Anderson, Brian, (Brian James) Verfasser aut Seven deadliest USB attacks Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie Burlington, MA Syngress ©2010 1 Online-Ressource (xiv, 222 pages) txt rdacontent c rdamedia cr rdacarrier Syngress seven deadliest attacks series Includes index Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdump Pod Slurping Social Engineering and USB Technology Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable Computer networks Security measures Computer science Computer security Computer networks / Security measures USB (Computer bus) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Informatik Computer networks Security measures http://www.sciencedirect.com/science/book/9781597495530 Verlag Volltext |
spellingShingle | Anderson, Brian, (Brian James) Seven deadliest USB attacks Computer networks Security measures Computer science Computer security Computer networks / Security measures USB (Computer bus) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Informatik Computer networks Security measures |
title | Seven deadliest USB attacks |
title_auth | Seven deadliest USB attacks |
title_exact_search | Seven deadliest USB attacks |
title_full | Seven deadliest USB attacks Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie |
title_fullStr | Seven deadliest USB attacks Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie |
title_full_unstemmed | Seven deadliest USB attacks Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie |
title_short | Seven deadliest USB attacks |
title_sort | seven deadliest usb attacks |
topic | Computer networks Security measures Computer science Computer security Computer networks / Security measures USB (Computer bus) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Informatik Computer networks Security measures |
topic_facet | Computer networks Security measures Computer science Computer security Computer networks / Security measures USB (Computer bus) COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Informatik Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781597495530 |
work_keys_str_mv | AT andersonbrianbrianjames sevendeadliestusbattacks |