言語:
日文
English
簡体中文
繁體中文
ヘルプ
ログイン
ホームページ
スイッチ:
ラベル
|
MARC形式
|
国際標準書誌記述(ISBD)
Cyber security essentials[electronic...
~
Graham, James
Cyber security essentials[electronic resource] /
レコード種別:
言語・文字資料 (印刷物) : 単行資料
[NT 15000414] null:
005.8
タイトル / 著者:
Cyber security essentials/ edited by James Graham, Richard Howard, Ryan Olson.
その他の著者:
Graham, James
出版された:
Boca Raton, FL : : Auerbach Publications :, c2010.
記述:
1 online resource (xv, 325 p.) : : ill.
主題:
Computer security.
国際標準図書番号 (ISBN) :
9781439851265
国際標準図書番号 (ISBN) :
1439851263
[NT 15000227] null:
Includes bibliographical references and index.
[NT 15000228] null:
Ch. 1. Cyber security fundamentals -- ch. 2. Attacker techniques and motivations -- ch. 3. Exploitation -- ch. 4. Malicious code -- ch. 5. Defense and analysis techniques -- ch. 6. iDefense special file investigation tools.
[NT 15000229] null:
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
電子資源:
http://www.crcnetbase.com/isbn/9781439851265
Cyber security essentials[electronic resource] /
Cyber security essentials
[electronic resource] /edited by James Graham, Richard Howard, Ryan Olson. - Boca Raton, FL :Auerbach Publications :c2010. - 1 online resource (xv, 325 p.) :ill.
Includes bibliographical references and index.
Ch. 1. Cyber security fundamentals -- ch. 2. Attacker techniques and motivations -- ch. 3. Exploitation -- ch. 4. Malicious code -- ch. 5. Defense and analysis techniques -- ch. 6. iDefense special file investigation tools.
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
ISBN: 9781439851265
LCCN: 2010044845Subjects--Topical Terms:
338952
Computer security.
Index Terms--Genre/Form:
336502
Electronic books.
LC Class. No.: QA76.9.A25 / C91915 2011eb
Dewey Class. No.: 005.8
Cyber security essentials[electronic resource] /
LDR
:01940cam a2200301Ia 4500
001
427866
003
OCoLC
005
20151105030112.0
006
m o d
007
cr cnu---unuuu
008
151130s2010 flua ob 001 0 eng d
010
$a
2010044845
020
$a
9781439851265
$q
(electronic bk.)
020
$a
1439851263
$q
(electronic bk.)
020
$z
9781439851234
020
$z
1439851239
035
$a
(OCoLC)701052769
$z
(OCoLC)708566090
$z
(OCoLC)780494539
035
$a
ocn701052769
040
$a
N
$b
eng
$c
N
$d
OCLCQ
$d
YDXCP
$d
CUS
$d
OCLCQ
$d
GZM
$d
EBLCP
$d
OCLCQ
$d
UA@
$d
OCLCA
$d
OCLCF
$d
DEBSZ
$d
OCLCQ
$d
S4S
$d
CRCPR
$d
OCLCQ
$d
E7B
050
4
$a
QA76.9.A25
$b
C91915 2011eb
082
0 4
$a
005.8
$2
22
245
0 0
$a
Cyber security essentials
$h
[electronic resource] /
$c
edited by James Graham, Richard Howard, Ryan Olson.
260
$a
Boca Raton, FL :
$b
Auerbach Publications :
$b
CRC Press,
$c
c2010.
300
$a
1 online resource (xv, 325 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
Ch. 1. Cyber security fundamentals -- ch. 2. Attacker techniques and motivations -- ch. 3. Exploitation -- ch. 4. Malicious code -- ch. 5. Defense and analysis techniques -- ch. 6. iDefense special file investigation tools.
520
$a
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
$c
Provided by publisher.
588
0
$a
Print version record.
650
0
$a
Computer security.
$3
338952
655
0
$a
Electronic books.
$2
local
$3
336502
700
1
$a
Graham, James
$q
(James John George)
$3
441365
700
1
$a
Howard, Richard,
$d
1959-
$3
609078
700
1
$a
Olson, Ryan,
$d
1981-
$3
609079
856
4 0
$u
http://www.crcnetbase.com/isbn/9781439851265
~に基づいて 0 論評
マルチメディア (複合媒体資料)
マルチメディアファイル
http://www.crcnetbase.com/isbn/9781439851265
論評
論評を追加
あなたの考えを共有してください。
Export
受取館
処理
...
パスワードを変更する
ログイン