• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Network attacks and exploitation :

پدید آورنده
Matthew Monte

موضوع
Business enterprises-- Computer networks-- Security measures.,Computer crimes-- Prevention.,Computer security.,Corporations-- Security measures.

رده
HF5548
.
37
M665
2015eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
111898708X
(Number (ISBN
1118987128
(Number (ISBN
1118987233
(Number (ISBN
1119183448
(Number (ISBN
9781118987087
(Number (ISBN
9781118987124
(Number (ISBN
9781118987230
(Number (ISBN
9781119183440
Erroneous ISBN
9781118987124

NATIONAL BIBLIOGRAPHY NUMBER

Number
dltt

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Network attacks and exploitation :
General Material Designation
[Book]
Other Title Information
a framework /
First Statement of Responsibility
Matthew Monte

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index

CONTENTS NOTE

Text of Note
Computer Network Exploitation -- The Attacker -- The Defender -- Asymmetries -- Attacker Frictions -- Defender Frictions -- Offensive Strategy -- Defensive Strategy -- Offensive Case Studies -- Epilogue -- Appendix: Attack Tools
0

SUMMARY OR ABSTRACT

Text of Note
This book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. --

OTHER EDITION IN ANOTHER MEDIUM

Title
Network attacks & exploitation : a framework.
International Standard Book Number
9781118987124

PARALLEL TITLE PROPER

Parallel Title
Network attacks & exploitation

TOPICAL NAME USED AS SUBJECT

Business enterprises-- Computer networks-- Security measures.
Computer crimes-- Prevention.
Computer security.
Corporations-- Security measures.

(SUBJECT CATEGORY (Provisional

BUS-- 041000
BUS-- 042000
BUS-- 082000
BUS-- 085000

DEWEY DECIMAL CLASSIFICATION

Number
658
.
4/78
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
HF5548
.
37
Book number
M665
2015eb

PERSONAL NAME - PRIMARY RESPONSIBILITY

Monte, Matthew

CORPORATE BODY NAME - ALTERNATIVE RESPONSIBILITY

Ohio Library and Information Network.

ORIGINATING SOURCE

Date of Transaction
20160603083805.5
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival