عرض عادي

Cyber security essentials / edited by James Graham, Richard Howard, Ryan Olson.

المساهم (المساهمين):نوع المادة : نصنصالناشر:Boca Raton, FL : Auerbach Publications, [2011]تاريخ حقوق النشر: ©2011وصف:xv, 325 pages : illustrations ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781439851234
  • 1439851239
الموضوع:تصنيف مكتبة الكونجرس:
  • QA76.9.A25 C934 2011
المحتويات:
Ch. 1. Cyber security fundamentals -- chapter 2. Attacker techniques and motivations -- chapter 3. Exploitation -- chapter 4. Malicious code -- chapter 5. Defense and analysis techniques -- chapter 6. iDefense special file investigation tools.
ملخص:"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"-- Provided by publisher.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.A25 C934 2011 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30020000010750

"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"-- Provided by publisher.

Includes bibliographical references and index.

Ch. 1. Cyber security fundamentals -- chapter 2. Attacker techniques and motivations -- chapter 3. Exploitation -- chapter 4. Malicious code -- chapter 5. Defense and analysis techniques -- chapter 6. iDefense special file investigation tools.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة