語系/ Language:
繁體中文
English
KMU OLIS
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber security essentials
~
Graham, James
Cyber security essentials
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyber security essentials/ edited by James Graham, Richard Howard, Ryan Olson.
其他作者:
Olson, Ryan,
出版者:
Boca Raton, FL :CRC Press, : c2010.,
面頁冊數:
1 online resource (xv, 325 p.) :ill. :
提要註:
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
標題:
Computer security. -
電子資源:
http://www.crcnetbase.com/isbn/9781439851265
ISBN:
9781439851265
Cyber security essentials
Cyber security essentials
[electronic resource] /edited by James Graham, Richard Howard, Ryan Olson. - Boca Raton, FL :CRC Press,c2010. - 1 online resource (xv, 325 p.) :ill.
Includes bibliographical references and index.
Ch. 1. Cyber security fundamentals -- ch. 2. Attacker techniques and motivations -- ch. 3. Exploitation -- ch. 4. Malicious code -- ch. 5. Defense and analysis techniques -- ch. 6. iDefense special file investigation tools.
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
ISBN: 9781439851265
LCCN: 2010044845Subjects--Topical Terms:
233829
Computer security.
Index Terms--Genre/Form:
228523
Electronic books.
LC Class. No.: QA76.9.A25 / C91915 2011eb
Dewey Class. No.: 005.8
Cyber security essentials
LDR
:01940cam a2200301Ia 4500
001
287901
003
OCoLC
005
20151105030112.0
006
m o d
007
cr cnu---unuuu
008
151124s2010 flua ob 001 0 eng d
010
$a
2010044845
020
$a
9781439851265
$q
(electronic bk.)
020
$a
1439851263
$q
(electronic bk.)
020
$z
9781439851234
020
$z
1439851239
035
$a
(OCoLC)701052769
$z
(OCoLC)708566090
$z
(OCoLC)780494539
035
$a
ocn701052769
040
$a
N
$b
eng
$c
N
$d
OCLCQ
$d
YDXCP
$d
CUS
$d
OCLCQ
$d
GZM
$d
EBLCP
$d
OCLCQ
$d
UA@
$d
OCLCA
$d
OCLCF
$d
DEBSZ
$d
OCLCQ
$d
S4S
$d
CRCPR
$d
OCLCQ
$d
E7B
050
4
$a
QA76.9.A25
$b
C91915 2011eb
082
0 4
$a
005.8
$2
22
245
0 0
$a
Cyber security essentials
$h
[electronic resource] /
$c
edited by James Graham, Richard Howard, Ryan Olson.
260
$a
Boca Raton, FL :
$c
c2010.
$b
CRC Press,
$b
Auerbach Publications :
300
$a
1 online resource (xv, 325 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
Ch. 1. Cyber security fundamentals -- ch. 2. Attacker techniques and motivations -- ch. 3. Exploitation -- ch. 4. Malicious code -- ch. 5. Defense and analysis techniques -- ch. 6. iDefense special file investigation tools.
520
$a
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
$c
Provided by publisher.
588
0
$a
Print version record.
650
0
$2
96060
$a
Computer security.
$3
233829
655
0
$a
Electronic books.
$2
local
$3
228523
700
1
$a
Olson, Ryan,
$d
1981-
$3
382408
700
1
$a
Howard, Richard,
$d
1959-
$3
382407
700
1
$a
Graham, James
$q
(James J.)
$3
382406
856
4 0
$u
http://www.crcnetbase.com/isbn/9781439851265
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
處理中
...
變更密碼
登入