Cyber Operations Building, Defending, and Attacking Modern Computer Networks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berkeley, CA
Apress
2015
|
Ausgabe: | 1st ed. 2015 |
Schlagworte: | |
Online-Zugang: | FHM01 FHN01 FHR01 FNU01 FWS01 FWS02 Volltext Abstract |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043208779 | ||
003 | DE-604 | ||
005 | 20151218 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9781484204573 |c Online |9 978-1-4842-0457-3 | ||
024 | 7 | |a 10.1007/978-1-4842-0457-3 |2 doi | |
035 | |a (OCoLC)930009925 | ||
035 | |a (DE-599)BVBBV043208779 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-863 |a DE-898 |a DE-862 |a DE-92 |a DE-M347 |a DE-1049 | ||
082 | 0 | |a 004 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a O'Leary, Mike |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber Operations |b Building, Defending, and Attacking Modern Computer Networks |c by Mike O'Leary |
250 | |a 1st ed. 2015 | ||
264 | 1 | |a Berkeley, CA |b Apress |c 2015 | |
300 | |a 1 Online Ressource (XXVIII, 744 p. 175 illus., 172 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 2 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4842-0458-0 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4842-0457-3 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028631939&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-CWD | ||
940 | 1 | |q ZDB-2-CWD_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028631939 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-1-4842-0457-3 |l FHM01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-0457-3 |l FHN01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-0457-3 |l FHR01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-0457-3 |l FNU01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-0457-3 |l FWS01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-0457-3 |l FWS02 |p ZDB-2-CWD |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 589526 |
---|---|
_version_ | 1806179600721510400 |
adam_text | CYBER OPERATIONS
/ O LEARY, MIKE
: 2015
ABSTRACT / INHALTSTEXT
CYBER OPERATIONS WALKS YOU THROUGH ALL THE PROCESSES TO SET UP, DEFEND,
AND ATTACK COMPUTER NETWORKS. THIS BOOK FOCUSES ON NETWORKS AND REAL
ATTACKS, OFFERS EXTENSIVE COVERAGE OF OFFENSIVE AND DEFENSIVE
TECHNIQUES, AND IS SUPPORTED BY A RICH COLLECTION OF EXERCISES AND
RESOURCES. YOU LL LEARN HOW TO CONFIGURE YOUR NETWORK FROM THE GROUND
UP, STARTING BY SETTING UP YOUR VIRTUAL TEST ENVIRONMENT WITH BASICS
LIKE DNS AND ACTIVE DIRECTORY, THROUGH COMMON NETWORK SERVICES, AND
ENDING WITH COMPLEX WEB APPLICATIONS INVOLVING WEB SERVERS AND BACKEND
DATABASES. KEY DEFENSIVE TECHNIQUES ARE INTEGRATED THROUGHOUT THE
EXPOSITION. YOU WILL DEVELOP SITUATIONAL AWARENESS OF YOUR NETWORK AND
WILL BUILD A COMPLETE DEFENSIVE INFRASTRUCTURE—INCLUDING LOG SERVERS,
NETWORK FIREWALLS, WEB APPLICATION FIREWALLS, AND INTRUSION DETECTION
SYSTEMS. OF COURSE, YOU CANNOT TRULY UNDERSTAND HOW TO DEFEND A NETWORK
IF YOU DO NOT KNOW HOW TO ATTACK IT, SO YOU WILL ATTACK YOUR TEST
SYSTEMS IN A VARIETY OF WAYS BEGINNING WITH ELEMENTARY ATTACKS AGAINST
BROWSERS AND CULMINATING WITH A CASE STUDY OF THE COMPROMISE OF A
DEFENDED E-COMMERCE SITE. THE AUTHOR, WHO HAS COACHED HIS UNIVERSITY’S
CYBER DEFENSE TEAM THREE TIMES TO THE FINALS OF THE NATIONAL COLLEGIATE
CYBER DEFENSE COMPETITION, PROVIDES A PRACTICAL, HANDS-ON APPROACH TO
CYBER SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | O'Leary, Mike |
author_facet | O'Leary, Mike |
author_role | aut |
author_sort | O'Leary, Mike |
author_variant | m o mo |
building | Verbundindex |
bvnumber | BV043208779 |
classification_rvk | ST 276 ST 277 ST 200 |
collection | ZDB-2-CWD |
ctrlnum | (OCoLC)930009925 (DE-599)BVBBV043208779 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4842-0457-3 |
edition | 1st ed. 2015 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02751nmm a2200601zc 4500</leader><controlfield tag="001">BV043208779</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20151218 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484204573</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4842-0457-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4842-0457-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)930009925</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043208779</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-1049</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">O'Leary, Mike</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Operations</subfield><subfield code="b">Building, Defending, and Attacking Modern Computer Networks</subfield><subfield code="c">by Mike O'Leary</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2015</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (XXVIII, 744 p. 175 illus., 172 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4842-0458-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028631939&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028631939</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="l">FNU01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-0457-3</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043208779 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:11:35Z |
institution | BVB |
isbn | 9781484204573 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028631939 |
oclc_num | 930009925 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS DE-898 DE-BY-UBR DE-862 DE-BY-FWS DE-92 DE-M347 DE-1049 |
owner_facet | DE-863 DE-BY-FWS DE-898 DE-BY-UBR DE-862 DE-BY-FWS DE-92 DE-M347 DE-1049 |
physical | 1 Online Ressource (XXVIII, 744 p. 175 illus., 172 illus. in color) |
psigel | ZDB-2-CWD ZDB-2-CWD_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Apress |
record_format | marc |
spellingShingle | O'Leary, Mike Cyber Operations Building, Defending, and Attacking Modern Computer Networks Chiffrierung (DE-588)4352893-4 gnd Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd Informatik (DE-588)4026894-9 gnd |
subject_GND | (DE-588)4352893-4 (DE-588)4011134-9 (DE-588)4274324-2 (DE-588)4026894-9 |
title | Cyber Operations Building, Defending, and Attacking Modern Computer Networks |
title_auth | Cyber Operations Building, Defending, and Attacking Modern Computer Networks |
title_exact_search | Cyber Operations Building, Defending, and Attacking Modern Computer Networks |
title_full | Cyber Operations Building, Defending, and Attacking Modern Computer Networks by Mike O'Leary |
title_fullStr | Cyber Operations Building, Defending, and Attacking Modern Computer Networks by Mike O'Leary |
title_full_unstemmed | Cyber Operations Building, Defending, and Attacking Modern Computer Networks by Mike O'Leary |
title_short | Cyber Operations |
title_sort | cyber operations building defending and attacking modern computer networks |
title_sub | Building, Defending, and Attacking Modern Computer Networks |
topic | Chiffrierung (DE-588)4352893-4 gnd Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd Informatik (DE-588)4026894-9 gnd |
topic_facet | Chiffrierung Datenschutz Computersicherheit Informatik |
url | https://doi.org/10.1007/978-1-4842-0457-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028631939&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT olearymike cyberoperationsbuildingdefendingandattackingmoderncomputernetworks |