Seven deadliest USB attacks

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Anderson, Brian, (Brian James) (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Burlington, MA Syngress ©2010
Schriftenreihe:Syngress seven deadliest attacks series
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV042300683
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 150129s2010 |||| o||u| ||||||eng d
020 |a 9781597495547  |c electronic bk.  |9 978-1-59749-554-7 
020 |a 1597495549  |c electronic bk.  |9 1-59749-554-9 
020 |a 9781597495530  |9 978-1-59749-553-0 
020 |a 1597495530  |9 1-59749-553-0 
035 |a (ZDB-33-EBS)ocn613958929 
035 |a (OCoLC)613958929 
035 |a (DE-599)BVBBV042300683 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046 
082 0 |a 005.8  |2 22 
100 1 |a Anderson, Brian, (Brian James)  |e Verfasser  |4 aut 
245 1 0 |a Seven deadliest USB attacks  |c Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie 
264 1 |a Burlington, MA  |b Syngress  |c ©2010 
300 |a 1 Online-Ressource (xiv, 222 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Syngress seven deadliest attacks series 
500 |a Includes index 
500 |a Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdump Pod Slurping Social Engineering and USB Technology Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable 
650 4 |a Computer networks 
650 4 |a Security measures 
650 4 |a Computer science 
650 4 |a Computer security 
650 4 |a Computer networks / Security measures 
650 4 |a USB (Computer bus) 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Computer networks / Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 4 |a Informatik 
650 4 |a Computer security 
650 4 |a Computer networks  |x Security measures 
856 4 0 |u http://www.sciencedirect.com/science/book/9781597495530  |x Verlag  |3 Volltext 
912 |a ZDB-33-ESD  |a ZDB-33-EBS 
940 1 |q FAW_PDA_ESD 
940 1 |q FLA_PDA_ESD 
999 |a oai:aleph.bib-bvb.de:BVB01-027737675 

Datensatz im Suchindex

_version_ 1804152878371176448
any_adam_object
author Anderson, Brian, (Brian James)
author_facet Anderson, Brian, (Brian James)
author_role aut
author_sort Anderson, Brian, (Brian James)
author_variant b b j a bbj bbja
building Verbundindex
bvnumber BV042300683
collection ZDB-33-ESD
ZDB-33-EBS
ctrlnum (ZDB-33-EBS)ocn613958929
(OCoLC)613958929
(DE-599)BVBBV042300683
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02923nmm a2200565zc 4500</leader><controlfield tag="001">BV042300683</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495547</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-554-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495549</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-554-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495530</subfield><subfield code="9">978-1-59749-553-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495530</subfield><subfield code="9">1-59749-553-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn613958929</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)613958929</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042300683</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Anderson, Brian, (Brian James)</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Seven deadliest USB attacks</subfield><subfield code="c">Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">©2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 222 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Syngress seven deadliest attacks series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdump Pod Slurping Social Engineering and USB Technology Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">USB (Computer bus)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495530</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027737675</subfield></datafield></record></collection>
id DE-604.BV042300683
illustrated Not Illustrated
indexdate 2024-07-10T01:17:42Z
institution BVB
isbn 9781597495547
1597495549
9781597495530
1597495530
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-027737675
oclc_num 613958929
open_access_boolean
owner DE-1046
owner_facet DE-1046
physical 1 Online-Ressource (xiv, 222 pages)
psigel ZDB-33-ESD
ZDB-33-EBS
FAW_PDA_ESD
FLA_PDA_ESD
publishDate 2010
publishDateSearch 2010
publishDateSort 2010
publisher Syngress
record_format marc
series2 Syngress seven deadliest attacks series
spelling Anderson, Brian, (Brian James) Verfasser aut
Seven deadliest USB attacks Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie
Burlington, MA Syngress ©2010
1 Online-Ressource (xiv, 222 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Syngress seven deadliest attacks series
Includes index
Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdump Pod Slurping Social Engineering and USB Technology Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable
Computer networks
Security measures
Computer science
Computer security
Computer networks / Security measures
USB (Computer bus)
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Informatik
Computer networks Security measures
http://www.sciencedirect.com/science/book/9781597495530 Verlag Volltext
spellingShingle Anderson, Brian, (Brian James)
Seven deadliest USB attacks
Computer networks
Security measures
Computer science
Computer security
Computer networks / Security measures
USB (Computer bus)
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Informatik
Computer networks Security measures
title Seven deadliest USB attacks
title_auth Seven deadliest USB attacks
title_exact_search Seven deadliest USB attacks
title_full Seven deadliest USB attacks Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie
title_fullStr Seven deadliest USB attacks Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie
title_full_unstemmed Seven deadliest USB attacks Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie
title_short Seven deadliest USB attacks
title_sort seven deadliest usb attacks
topic Computer networks
Security measures
Computer science
Computer security
Computer networks / Security measures
USB (Computer bus)
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Informatik
Computer networks Security measures
topic_facet Computer networks
Security measures
Computer science
Computer security
Computer networks / Security measures
USB (Computer bus)
COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Informatik
Computer networks Security measures
url http://www.sciencedirect.com/science/book/9781597495530
work_keys_str_mv AT andersonbrianbrianjames sevendeadliestusbattacks