Cyber Operations Building, Defending, and Attacking Modern Computer Networks

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: O'Leary, Mike (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Berkeley, CA Apress 2015
Ausgabe:1st ed. 2015
Schlagworte:
Online-Zugang:FHM01
FHN01
FHR01
FNU01
FWS01
FWS02
Volltext
Abstract
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV043208779
003 DE-604
005 20151218
007 cr|uuu---uuuuu
008 151215s2015 |||| o||u| ||||||eng d
020 |a 9781484204573  |c Online  |9 978-1-4842-0457-3 
024 7 |a 10.1007/978-1-4842-0457-3  |2 doi 
035 |a (OCoLC)930009925 
035 |a (DE-599)BVBBV043208779 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-863  |a DE-898  |a DE-862  |a DE-92  |a DE-M347  |a DE-1049 
082 0 |a 004 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
084 |a ST 200  |0 (DE-625)143611:  |2 rvk 
100 1 |a O'Leary, Mike  |e Verfasser  |4 aut 
245 1 0 |a Cyber Operations  |b Building, Defending, and Attacking Modern Computer Networks  |c by Mike O'Leary 
250 |a 1st ed. 2015 
264 1 |a Berkeley, CA  |b Apress  |c 2015 
300 |a 1 Online Ressource (XXVIII, 744 p. 175 illus., 172 illus. in color) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
650 0 7 |a Chiffrierung  |0 (DE-588)4352893-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Datenschutz  |0 (DE-588)4011134-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Informatik  |0 (DE-588)4026894-9  |2 gnd  |9 rswk-swf 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 1 |a Chiffrierung  |0 (DE-588)4352893-4  |D s 
689 0 2 |a Informatik  |0 (DE-588)4026894-9  |D s 
689 0 |5 DE-604 
689 1 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 1 1 |a Datenschutz  |0 (DE-588)4011134-9  |D s 
689 1 |8 1\p  |5 DE-604 
776 0 8 |i Erscheint auch als  |n Druckausgabe  |z 978-1-4842-0458-0 
856 4 0 |u https://doi.org/10.1007/978-1-4842-0457-3  |x Verlag  |3 Volltext 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028631939&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Abstract 
912 |a ZDB-2-CWD 
940 1 |q ZDB-2-CWD_2015 
999 |a oai:aleph.bib-bvb.de:BVB01-028631939 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
966 e |u https://doi.org/10.1007/978-1-4842-0457-3  |l FHM01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-0457-3  |l FHN01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-0457-3  |l FHR01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-0457-3  |l FNU01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-0457-3  |l FWS01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-0457-3  |l FWS02  |p ZDB-2-CWD  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-FWS_katkey 589526
_version_ 1806179600721510400
adam_text CYBER OPERATIONS / O LEARY, MIKE : 2015 ABSTRACT / INHALTSTEXT CYBER OPERATIONS WALKS YOU THROUGH ALL THE PROCESSES TO SET UP, DEFEND, AND ATTACK COMPUTER NETWORKS. THIS BOOK FOCUSES ON NETWORKS AND REAL ATTACKS, OFFERS EXTENSIVE COVERAGE OF OFFENSIVE AND DEFENSIVE TECHNIQUES, AND IS SUPPORTED BY A RICH COLLECTION OF EXERCISES AND RESOURCES. YOU LL LEARN HOW TO CONFIGURE YOUR NETWORK FROM THE GROUND UP, STARTING BY SETTING UP YOUR VIRTUAL TEST ENVIRONMENT WITH BASICS LIKE DNS AND ACTIVE DIRECTORY, THROUGH COMMON NETWORK SERVICES, AND ENDING WITH COMPLEX WEB APPLICATIONS INVOLVING WEB SERVERS AND BACKEND DATABASES. KEY DEFENSIVE TECHNIQUES ARE INTEGRATED THROUGHOUT THE EXPOSITION. YOU WILL DEVELOP SITUATIONAL AWARENESS OF YOUR NETWORK AND WILL BUILD A COMPLETE DEFENSIVE INFRASTRUCTURE—INCLUDING LOG SERVERS, NETWORK FIREWALLS, WEB APPLICATION FIREWALLS, AND INTRUSION DETECTION SYSTEMS. OF COURSE, YOU CANNOT TRULY UNDERSTAND HOW TO DEFEND A NETWORK IF YOU DO NOT KNOW HOW TO ATTACK IT, SO YOU WILL ATTACK YOUR TEST SYSTEMS IN A VARIETY OF WAYS BEGINNING WITH ELEMENTARY ATTACKS AGAINST BROWSERS AND CULMINATING WITH A CASE STUDY OF THE COMPROMISE OF A DEFENDED E-COMMERCE SITE. THE AUTHOR, WHO HAS COACHED HIS UNIVERSITY’S CYBER DEFENSE TEAM THREE TIMES TO THE FINALS OF THE NATIONAL COLLEGIATE CYBER DEFENSE COMPETITION, PROVIDES A PRACTICAL, HANDS-ON APPROACH TO CYBER SECURITY DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
any_adam_object 1
author O'Leary, Mike
author_facet O'Leary, Mike
author_role aut
author_sort O'Leary, Mike
author_variant m o mo
building Verbundindex
bvnumber BV043208779
classification_rvk ST 276
ST 277
ST 200
collection ZDB-2-CWD
ctrlnum (OCoLC)930009925
(DE-599)BVBBV043208779
dewey-full 004
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 004 - Computer science
dewey-raw 004
dewey-search 004
dewey-sort 14
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-1-4842-0457-3
edition 1st ed. 2015
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02751nmm a2200601zc 4500</leader><controlfield tag="001">BV043208779</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20151218 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484204573</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4842-0457-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4842-0457-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)930009925</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043208779</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-1049</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">O'Leary, Mike</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Operations</subfield><subfield code="b">Building, Defending, and Attacking Modern Computer Networks</subfield><subfield code="c">by Mike O'Leary</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2015</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (XXVIII, 744 p. 175 illus., 172 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4842-0458-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=028631939&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028631939</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="l">FNU01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043208779
illustrated Not Illustrated
indexdate 2024-08-01T12:11:35Z
institution BVB
isbn 9781484204573
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028631939
oclc_num 930009925
open_access_boolean
owner DE-863
DE-BY-FWS
DE-898
DE-BY-UBR
DE-862
DE-BY-FWS
DE-92
DE-M347
DE-1049
owner_facet DE-863
DE-BY-FWS
DE-898
DE-BY-UBR
DE-862
DE-BY-FWS
DE-92
DE-M347
DE-1049
physical 1 Online Ressource (XXVIII, 744 p. 175 illus., 172 illus. in color)
psigel ZDB-2-CWD
ZDB-2-CWD_2015
publishDate 2015
publishDateSearch 2015
publishDateSort 2015
publisher Apress
record_format marc
spellingShingle O'Leary, Mike
Cyber Operations Building, Defending, and Attacking Modern Computer Networks
Chiffrierung (DE-588)4352893-4 gnd
Datenschutz (DE-588)4011134-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Informatik (DE-588)4026894-9 gnd
subject_GND (DE-588)4352893-4
(DE-588)4011134-9
(DE-588)4274324-2
(DE-588)4026894-9
title Cyber Operations Building, Defending, and Attacking Modern Computer Networks
title_auth Cyber Operations Building, Defending, and Attacking Modern Computer Networks
title_exact_search Cyber Operations Building, Defending, and Attacking Modern Computer Networks
title_full Cyber Operations Building, Defending, and Attacking Modern Computer Networks by Mike O'Leary
title_fullStr Cyber Operations Building, Defending, and Attacking Modern Computer Networks by Mike O'Leary
title_full_unstemmed Cyber Operations Building, Defending, and Attacking Modern Computer Networks by Mike O'Leary
title_short Cyber Operations
title_sort cyber operations building defending and attacking modern computer networks
title_sub Building, Defending, and Attacking Modern Computer Networks
topic Chiffrierung (DE-588)4352893-4 gnd
Datenschutz (DE-588)4011134-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Informatik (DE-588)4026894-9 gnd
topic_facet Chiffrierung
Datenschutz
Computersicherheit
Informatik
url https://doi.org/10.1007/978-1-4842-0457-3
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028631939&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT olearymike cyberoperationsbuildingdefendingandattackingmoderncomputernetworks