000 | 01826cam a22004097a 4500 | ||
---|---|---|---|
001 | ocm15144819 | ||
003 | AE-DuAU | ||
005 | 20241127170509.0 | ||
008 | 080116s2008 maua 001 0 eng d | ||
010 | _a 2008270325 | ||
020 | _a1597492248 | ||
020 | _a9781597492249 (pbk.) | ||
050 | 0 | 0 |
_aQA76.9.D314 _bI565 2008 |
090 | _aQA 76.9. D314 I565 2008 | ||
245 | 0 | 0 |
_aInfosecurity 2008 threat analysis / _c[authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford. |
246 | 3 | 0 | _aThreat analysis |
260 |
_aBurlington, MA : _bSyngress Publishing, _cc2008. |
||
300 |
_axxiv, 442 p. : _bill. ; _c24 cm. |
||
336 |
_2rdacontent _atext _btxt |
||
337 |
_2rdamedia _aunmediated _bn |
||
338 |
_2rdacarrier _avolume _bnc |
||
500 | _aIncludes index. | ||
505 | 0 | _aBotnets : a call to action -- Botnets overview -- Cross-site scripting fundamentals -- XSS theory -- XSS attack methods -- Protecting critical infrastructure : process control and SCADA -- Final thoughts -- Why PCI is important -- Protect cardholder data -- Understanding and taking advantage of VoIP protocols -- Asterisk hardware ninjutsu -- Social engineering. | |
650 | 0 |
_aDatabase security. _9127775 |
|
650 | 0 |
_aComputer security. _9127776 |
|
650 | 0 |
_aData protection. _9127777 |
|
650 | 0 |
_aComputers _xAccess control. _9127778 |
|
650 | 0 |
_aTelecommunication _xSecurity measures. _9127779 |
|
700 | 1 |
_aClark, Champ, _cIII. _9127780 |
|
852 |
_9p59.95 _y05-11-2009 |
||
907 |
_a22350 _b08-06-10 _c08-06-10 |
||
942 |
_cBOOK _00 |
||
998 |
_aaudmc _b05-11-09 _cm _da _e- _feng _gmau _h0 |
||
905 | _aPR34566 | ||
953 | _a04302009 | ||
945 |
_g0 _i602056 _j0 _laudmc _nCopy Type:01 - Books _o- _p220.32 _q- _r- _s- _t1 _u0 _v0 _w0 _x0 _yi10294430 _z08-06-10 |
||
999 |
_c22350 _d22350 |