Seven deadliest network attacks

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Prowell, Stacy J. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Amsterdam Syngress ©2010
Schriftenreihe:Syngress seven deadliest attacks series
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV042300685
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 150129s2010 xx o|||| 00||| eng d
020 |a 9781597495509  |c electronic bk.  |9 978-1-59749-550-9 
020 |a 1597495506  |c electronic bk.  |9 1-59749-550-6 
020 |a 9781597495493  |9 978-1-59749-549-3 
020 |a 1597495492  |9 1-59749-549-2 
035 |a (OCoLC)613962609 
035 |a (DE-599)BVBBV042300685 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046 
082 0 |a 005.8  |2 22 
100 1 |a Prowell, Stacy J.  |e Verfasser  |4 aut 
245 1 0 |a Seven deadliest network attacks  |c Stacy Prowell, Rob Kraus, Mike Borkin 
264 1 |a Amsterdam  |b Syngress  |c ©2010 
300 |a 1 Online-Ressource (xiv, 142 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Syngress seven deadliest attacks series 
500 |a Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable 
500 |a Includes bibliographical references and index 
650 4 |a Access control 
650 4 |a Computer networks 
650 4 |a Security measures 
650 4 |a Computer science 
650 4 |a Engineering 
650 4 |a Electrical engineering 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Computer networks / Access control  |2 fast 
650 7 |a Computer networks / Security measures  |2 fast 
650 4 |a Informatik 
650 4 |a Ingenieurwissenschaften 
650 4 |a Computer networks  |x Security measures 
650 4 |a Computer networks  |x Access control 
700 1 |a Kraus, Rob  |e Sonstige  |4 oth 
700 1 |a Borkin, Mike  |e Sonstige  |4 oth 
856 4 0 |u http://www.sciencedirect.com/science/book/9781597495493  |x Verlag  |3 Volltext 
912 |a ZDB-33-ESD 
912 |a ZDB-33-EBS 
940 1 |q FAW_PDA_ESD 
940 1 |q FLA_PDA_ESD 
943 1 |a oai:aleph.bib-bvb.de:BVB01-027737677 

Datensatz im Suchindex

_version_ 1819294000418390017
any_adam_object
author Prowell, Stacy J.
author_facet Prowell, Stacy J.
author_role aut
author_sort Prowell, Stacy J.
author_variant s j p sj sjp
building Verbundindex
bvnumber BV042300685
collection ZDB-33-ESD
ZDB-33-EBS
ctrlnum (OCoLC)613962609
(DE-599)BVBBV042300685
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03006nam a2200601zc 4500</leader><controlfield tag="001">BV042300685</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2010 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495509</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-550-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495506</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-550-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495493</subfield><subfield code="9">978-1-59749-549-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495492</subfield><subfield code="9">1-59749-549-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)613962609</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042300685</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Prowell, Stacy J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Seven deadliest network attacks</subfield><subfield code="c">Stacy Prowell, Rob Kraus, Mike Borkin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Syngress</subfield><subfield code="c">©2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 142 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Syngress seven deadliest attacks series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kraus, Rob</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Borkin, Mike</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495493</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027737677</subfield></datafield></record></collection>
id DE-604.BV042300685
illustrated Not Illustrated
indexdate 2024-12-24T04:19:17Z
institution BVB
isbn 9781597495509
1597495506
9781597495493
1597495492
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-027737677
oclc_num 613962609
open_access_boolean
owner DE-1046
owner_facet DE-1046
physical 1 Online-Ressource (xiv, 142 pages)
psigel ZDB-33-ESD
ZDB-33-EBS
FAW_PDA_ESD
FLA_PDA_ESD
publishDate 2010
publishDateSearch 2010
publishDateSort 2010
publisher Syngress
record_format marc
series2 Syngress seven deadliest attacks series
spelling Prowell, Stacy J. Verfasser aut
Seven deadliest network attacks Stacy Prowell, Rob Kraus, Mike Borkin
Amsterdam Syngress ©2010
1 Online-Ressource (xiv, 142 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Syngress seven deadliest attacks series
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable
Includes bibliographical references and index
Access control
Computer networks
Security measures
Computer science
Engineering
Electrical engineering
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Access control fast
Computer networks / Security measures fast
Informatik
Ingenieurwissenschaften
Computer networks Security measures
Computer networks Access control
Kraus, Rob Sonstige oth
Borkin, Mike Sonstige oth
http://www.sciencedirect.com/science/book/9781597495493 Verlag Volltext
spellingShingle Prowell, Stacy J.
Seven deadliest network attacks
Access control
Computer networks
Security measures
Computer science
Engineering
Electrical engineering
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Access control fast
Computer networks / Security measures fast
Informatik
Ingenieurwissenschaften
Computer networks Security measures
Computer networks Access control
title Seven deadliest network attacks
title_auth Seven deadliest network attacks
title_exact_search Seven deadliest network attacks
title_full Seven deadliest network attacks Stacy Prowell, Rob Kraus, Mike Borkin
title_fullStr Seven deadliest network attacks Stacy Prowell, Rob Kraus, Mike Borkin
title_full_unstemmed Seven deadliest network attacks Stacy Prowell, Rob Kraus, Mike Borkin
title_short Seven deadliest network attacks
title_sort seven deadliest network attacks
topic Access control
Computer networks
Security measures
Computer science
Engineering
Electrical engineering
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Access control fast
Computer networks / Security measures fast
Informatik
Ingenieurwissenschaften
Computer networks Security measures
Computer networks Access control
topic_facet Access control
Computer networks
Security measures
Computer science
Engineering
Electrical engineering
COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Computer networks / Access control
Computer networks / Security measures
Informatik
Ingenieurwissenschaften
Computer networks Security measures
Computer networks Access control
url http://www.sciencedirect.com/science/book/9781597495493
work_keys_str_mv AT prowellstacyj sevendeadliestnetworkattacks
AT krausrob sevendeadliestnetworkattacks
AT borkinmike sevendeadliestnetworkattacks