Network attacks and exploitation : a framework /

This book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Num...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Monte, Matthew (Συγγραφέας)
Μορφή: Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Indianapolis, IN : Wiley, 2015.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03860nam a2200757 4500
001 ocn913742234
003 OCoLC
005 20170124071744.9
006 m o d
007 cr cnu|||unuuu
008 150713s2015 inu ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d OCLCO  |d IDEBK  |d DEBSZ  |d OCLCO  |d BAL  |d YDXCP  |d DG1  |d OCLCO  |d CDX  |d STF  |d B24X7  |d OCLCF  |d OCLCO  |d COO  |d OCLCO  |d EBLCP  |d OCLCQ  |d DEBBG  |d BAL  |d RECBK  |d CCO  |d GrThAP 
019 |a 959273207  |a 959873288 
020 |a 9781119183440  |q electronic bk. 
020 |a 1119183448  |q electronic bk. 
020 |a 9781118987087  |q electronic bk. 
020 |a 111898708X  |q electronic bk. 
020 |z 9781118987124 
020 |a 9781118987230 
020 |a 1118987233 
020 |a 1118987128 
020 |a 9781118987124 
029 1 |a DEBSZ  |b 442835701 
029 1 |a CHVBK  |b 339960892 
029 1 |a CHDSB  |b 006441166 
029 1 |a AU@  |b 000056104417 
029 1 |a DEBBG  |b BV043397940 
029 1 |a DEBBG  |b BV043892434 
035 |a (OCoLC)913742234  |z (OCoLC)959273207  |z (OCoLC)959873288 
050 4 |a HF5548.37  |b M665 2015eb 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658.4/78  |2 23 
049 |a MAIN 
100 1 |a Monte, Matthew,  |e author. 
245 1 0 |a Network attacks and exploitation :  |b a framework /  |c Matthew Monte. 
246 3 |a Network attacks & exploitation 
264 1 |a Indianapolis, IN :  |b Wiley,  |c 2015. 
264 4 |c ©2015 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed July 15, 2015). 
505 0 |a Computer Network Exploitation -- The Attacker -- The Defender -- Asymmetries -- Attacker Frictions -- Defender Frictions -- Offensive Strategy -- Defensive Strategy -- Offensive Case Studies. 
504 |a Includes bibliographical references and index. 
520 |a This book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. --  |c Edited summary from book. 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Corporations  |x Security measures. 
650 7 |a BUSINESS & ECONOMICS / Industrial Management  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS / Management  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS / Management Science  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS / Organizational Behavior  |2 bisacsh 
650 7 |a Business enterprises  |x Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00842535 
650 7 |a Computer crimes  |x Prevention.  |2 fast  |0 (OCoLC)fst00872068 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Corporations  |x Security measures.  |2 fast  |0 (OCoLC)fst00879928 
655 4 |a Electronic books. 
655 0 |a Electronic books. 
776 0 8 |i Print version:  |a Monte, Matthew.  |t Network attacks & exploitation : a framework.  |d Indianapolis, Indiana : Wiley, c2015  |h xviii, 198 pages  |z 9781118987124  |w 2014958441 
856 4 0 |u https://doi.org/10.1002/9781119183440  |z Full Text via HEAL-Link 
994 |a 92  |b DG1