Network attacks and exploitation : a framework / (Record no. 208114)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03853cam a2200745Ii 4500 |
001 - CONTROL NUMBER | |
control field | ocn913742234 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20170918134420.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 150713s2015 inu ob 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119183440 |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119183448 |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118987087 |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 111898708X |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781118987124 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118987230 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1118987233 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1118987128 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118987124 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 442835701 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHVBK |
System control number | 339960892 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHDSB |
System control number | 006441166 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000056104417 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV043397940 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV043892434 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)913742234 |
Canceled/invalid control number | (OCoLC)959273207 |
-- | (OCoLC)959873288 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | N$T |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | N$T |
Modifying agency | N$T |
-- | OCLCO |
-- | IDEBK |
-- | DEBSZ |
-- | OCLCO |
-- | BAL |
-- | YDXCP |
-- | DG1 |
-- | OCLCO |
-- | CDX |
-- | STF |
-- | B24X7 |
-- | OCLCF |
-- | OCLCO |
-- | COO |
-- | OCLCO |
-- | EBLCP |
-- | OCLCQ |
-- | DEBBG |
-- | BAL |
-- | RECBK |
-- | CCO |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HF5548.37 |
Item number | M665 2015eb |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 082000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 041000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 042000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 085000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 658.4/78 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Monte, Matthew, |
245 10 - TITLE STATEMENT | |
Title | Network attacks and exploitation : a framework / |
Statement of responsibility, etc. | Matthew Monte. |
Medium | [electronic resource] |
246 3# - VARYING FORM OF TITLE | |
Title proper/short title | Network attacks & exploitation |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Indianapolis, IN : |
Name of producer, publisher, distributor, manufacturer | Wiley, |
Date of production, publication, distribution, manufacture, or copyright notice | 2015. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Computer Network Exploitation -- The Attacker -- The Defender -- Asymmetries -- Attacker Frictions -- Defender Frictions -- Offensive Strategy -- Defensive Strategy -- Offensive Case Studies. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. -- |
Assigning source | Edited summary from book. |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Online resource; title from PDF title page (EBSCO, viewed July 15, 2015). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Business enterprises |
General subdivision | Computer networks |
-- | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes |
General subdivision | Prevention. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Corporations |
General subdivision | Security measures. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | BUSINESS & ECONOMICS / Industrial Management |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | BUSINESS & ECONOMICS / Management |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | BUSINESS & ECONOMICS / Management Science |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | BUSINESS & ECONOMICS / Organizational Behavior |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Business enterprises |
General subdivision | Computer networks |
-- | Security measures. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00842535 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes |
General subdivision | Prevention. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00872068 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00872484 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Corporations |
General subdivision | Security measures. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00879928 |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
655 #0 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Monte, Matthew. |
Title | Network attacks & exploitation : a framework. |
Place, publisher, and date of publication | Indianapolis, Indiana : Wiley, c2015 |
Physical description | xviii, 198 pages |
International Standard Book Number | 9781118987124 |
Record control number | 2014958441 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://onlinelibrary.wiley.com/book/10.1002/9781119183440 |
Public note | Wiley Online Library |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Books |
No items available.