語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Aggressive network self-defense[elec...
~
Archibald, Neil.
Aggressive network self-defense[electronic resource] /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
005.8
書名/作者:
Aggressive network self-defense/ Neil Archibald ... [et al.] ; technical editor Neil R. Wyler (aka Grifter), foreword by Timothy M. Mullen (Thor).
其他作者:
Archibald, Neil.
出版者:
Rockland, MA : : Syngress Pub.,, c2005.
面頁冊數:
xxx, 383 p. : : ill. ;; 24 cm.
標題:
Computer security.
標題:
Computer networks - Security measures.
標題:
Internet - Security measures.
ISBN:
9781931836203
ISBN:
1931836205
書目註:
Includes bibliographical references and index.
內容註:
Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough.
摘要、提要註:
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker. *First book to demonstrate and explore controversial network strike back and countermeasure techniques. *Provides tightly guarded secrets to find out WHO is really attacking you over the internet. *Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
Aggressive network self-defense[electronic resource] /
Aggressive network self-defense
[electronic resource] /Neil Archibald ... [et al.] ; technical editor Neil R. Wyler (aka Grifter), foreword by Timothy M. Mullen (Thor). - Rockland, MA :Syngress Pub.,c2005. - xxx, 383 p. :ill. ;24 cm.
Includes bibliographical references and index.
Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough.
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker. *First book to demonstrate and explore controversial network strike back and countermeasure techniques. *Provides tightly guarded secrets to find out WHO is really attacking you over the internet. *Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9781931836203
Source: 112087:112175Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
338952
Computer security.
Index Terms--Genre/Form:
336502
Electronic books.
LC Class. No.: TK5105.59 / .A387 2005eb
Dewey Class. No.: 005.8
Aggressive network self-defense[electronic resource] /
LDR
:03100cam 2200337Ia 4500
001
337594
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
110620s2005 maua ob 001 0 eng d
020
$a
9781931836203
020
$a
1931836205
035
$a
(OCoLC)162721189
035
$a
ocn162721189
037
$a
112087:112175
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
049
$a
TEFA
050
1 4
$a
TK5105.59
$b
.A387 2005eb
050
1 4
$a
QA76.9.A25
$b
A447 2005eb
082
0 4
$a
005.8
$2
22
245
0 0
$a
Aggressive network self-defense
$h
[electronic resource] /
$c
Neil Archibald ... [et al.] ; technical editor Neil R. Wyler (aka Grifter), foreword by Timothy M. Mullen (Thor).
260
$a
Rockland, MA :
$b
Syngress Pub.,
$c
c2005.
300
$a
xxx, 383 p. :
$b
ill. ;
$c
24 cm.
504
$a
Includes bibliographical references and index.
505
0
$a
Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough.
520
$a
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker. *First book to demonstrate and explore controversial network strike back and countermeasure techniques. *Provides tightly guarded secrets to find out WHO is really attacking you over the internet. *Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer security.
$3
338952
650
0
$a
Computer networks
$x
Security measures.
$3
341462
650
0
$a
Internet
$x
Security measures.
$3
338953
655
7
$a
Electronic books.
$2
local
$3
336502
700
1
$a
Archibald, Neil.
$3
403750
700
1
$a
Wyler, Neil R.
$3
403751
700
1
$a
Mullen, Timothy M.
$3
403752
710
2
$a
ScienceDirect (Online service)
$3
365609
776
1
$c
Original
$z
1931836205
$z
9781931836203
$w
(OCoLC)58566416
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781931836203
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781931836203
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
筆 0 讀者評論
多媒體
多媒體檔案
http://www.sciencedirect.com/science/book/9781931836203
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781931836203
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入