Malicious bots : an inside look into the cyber-criminal underground of the internet / Ken Dunham and Jim Melnick.
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9781420069037 (hbk)
- 1420069039 (hbk)
- HV6773 D86 2009
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | HV6773 D86 2009 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010011314659 | ||
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | HV6773 D86 2009 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010011314660 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
HV6773 D47 1999 The economic costs and implications of high-technology hardware theft / | HV6773 .D55 2006 Digital crime and forensic science in cyberspace / | HV6773 D86 2009 Malicious bots : an inside look into the cyber-criminal underground of the internet / | HV6773 D86 2009 Malicious bots : an inside look into the cyber-criminal underground of the internet / | HV6773 E53 2009 Encyclopedia of cybercrime / | HV6773 E53 2009 Encyclopedia of cybercrime / | HV6773 E73 2001 Information Warfare : how to survive cyber attacks / |
"An Auerbach book."
Includes bibliographical references (pages 135-143) and index.
Introduction to bots -- Thr34t security krew and the TK worm -- Demonstration : how a hacker launches a botnet attack -- Introduction to the use of botnets in criminal activity -- Botnets and the ecrime cycle: the iSIGHT partners' approach -- Technical introduction to bots -- Mitigation -- Concluding thoughts.
License restrictions may limit access.