000 | 02584cam a2200457Ii 4500 | ||
---|---|---|---|
020 |
_a9781119183440 _qelectronic bk. |
||
020 |
_a1119183448 _qelectronic bk. |
||
020 |
_a9781118987087 _qelectronic bk. |
||
020 |
_a111898708X _qelectronic bk. |
||
020 | _z9781118987124 | ||
020 | _a9781118987230 | ||
020 | _a1118987233 | ||
020 | _a1118987128 | ||
020 | _a9781118987124 | ||
040 | _cCUS | ||
072 | 7 |
_aBUS _x082000 _2bisacsh |
|
072 | 7 |
_aBUS _x041000 _2bisacsh |
|
072 | 7 |
_aBUS _x042000 _2bisacsh |
|
072 | 7 |
_aBUS _x085000 _2bisacsh |
|
100 | 1 |
_aMonte, Matthew, _eauthor. |
|
245 | 1 | 0 |
_aNetwork attacks and exploitation : _ba framework / _cMatthew Monte. |
246 | 3 | _aNetwork attacks & exploitation | |
260 | 1 |
_aIndianapolis, IN : _bWiley, _c2015. |
|
260 | 4 | _c©2015 | |
300 | _a1 online resource. | ||
505 | 0 | _aComputer Network Exploitation -- The Attacker -- The Defender -- Asymmetries -- Attacker Frictions -- Defender Frictions -- Offensive Strategy -- Defensive Strategy -- Offensive Case Studies. | |
520 |
_aThis book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. -- _cEdited summary from book. |
||
650 | 0 |
_aBusiness enterprises _xComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer crimes _xPrevention. |
|
650 | 0 |
_aCorporations _xSecurity measures. |
|
650 | 7 |
_aBUSINESS & ECONOMICS / Industrial Management _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS / Management _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS / Management Science _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS / Organizational Behavior _2bisacsh |
|
650 | 7 |
_aBusiness enterprises _xComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00842535 |
|
650 | 7 |
_aComputer crimes _xPrevention. _2fast _0(OCoLC)fst00872068 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
650 | 7 |
_aCorporations _xSecurity measures. _2fast _0(OCoLC)fst00879928 |
|
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119183440 _zWiley Online Library |
942 | _cEBK | ||
999 |
_c208650 _d208650 |