Language:
English
繁體中文
KMU OLIS
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyber security essentials
~
Graham, James
Cyber security essentials
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Cyber security essentials/ edited by James Graham, Richard Howard, Ryan Olson.
other author:
Olson, Ryan,
Published:
Boca Raton, FL :CRC Press, : c2010.,
Description:
1 online resource (xv, 325 p.) :ill. :
基督教聖經之智慧書導讀 :
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
Subject:
Computer security. -
Online resource:
http://www.crcnetbase.com/isbn/9781439851265
ISBN:
9781439851265
Cyber security essentials
Cyber security essentials
[electronic resource] /edited by James Graham, Richard Howard, Ryan Olson. - Boca Raton, FL :CRC Press,c2010. - 1 online resource (xv, 325 p.) :ill.
Includes bibliographical references and index.
Ch. 1. Cyber security fundamentals -- ch. 2. Attacker techniques and motivations -- ch. 3. Exploitation -- ch. 4. Malicious code -- ch. 5. Defense and analysis techniques -- ch. 6. iDefense special file investigation tools.
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
ISBN: 9781439851265
LCCN: 2010044845Subjects--Topical Terms:
233829
Computer security.
Index Terms--Genre/Form:
228523
Electronic books.
LC Class. No.: QA76.9.A25 / C91915 2011eb
Dewey Class. No.: 005.8
Cyber security essentials
LDR
:01940cam a2200301Ia 4500
001
287901
003
OCoLC
005
20151105030112.0
006
m o d
007
cr cnu---unuuu
008
151124s2010 flua ob 001 0 eng d
010
$a
2010044845
020
$a
9781439851265
$q
(electronic bk.)
020
$a
1439851263
$q
(electronic bk.)
020
$z
9781439851234
020
$z
1439851239
035
$a
(OCoLC)701052769
$z
(OCoLC)708566090
$z
(OCoLC)780494539
035
$a
ocn701052769
040
$a
N
$b
eng
$c
N
$d
OCLCQ
$d
YDXCP
$d
CUS
$d
OCLCQ
$d
GZM
$d
EBLCP
$d
OCLCQ
$d
UA@
$d
OCLCA
$d
OCLCF
$d
DEBSZ
$d
OCLCQ
$d
S4S
$d
CRCPR
$d
OCLCQ
$d
E7B
050
4
$a
QA76.9.A25
$b
C91915 2011eb
082
0 4
$a
005.8
$2
22
245
0 0
$a
Cyber security essentials
$h
[electronic resource] /
$c
edited by James Graham, Richard Howard, Ryan Olson.
260
$a
Boca Raton, FL :
$c
c2010.
$b
CRC Press,
$b
Auerbach Publications :
300
$a
1 online resource (xv, 325 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
Ch. 1. Cyber security fundamentals -- ch. 2. Attacker techniques and motivations -- ch. 3. Exploitation -- ch. 4. Malicious code -- ch. 5. Defense and analysis techniques -- ch. 6. iDefense special file investigation tools.
520
$a
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
$c
Provided by publisher.
588
0
$a
Print version record.
650
0
$2
96060
$a
Computer security.
$3
233829
655
0
$a
Electronic books.
$2
local
$3
228523
700
1
$a
Olson, Ryan,
$d
1981-
$3
382408
700
1
$a
Howard, Richard,
$d
1959-
$3
382407
700
1
$a
Graham, James
$q
(James J.)
$3
382406
856
4 0
$u
http://www.crcnetbase.com/isbn/9781439851265
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login