Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Botnetsthe killer web app /
~
Schiller, Craig A.
Botnetsthe killer web app /
Record Type:
Electronic resources : Monograph/item
Title/Author:
BotnetsCraig A. Schiller ... [et al.].
Reminder of title:
the killer web app /
Author:
Schiller, Craig A.
Published:
Rockland, MA :Syngress Publishing,c2007.
Description:
xv, 464 p. :ill. ;23 cm.
Notes:
Includes index.
Subject:
Computer networksSecurity measures.
Online resource:
An electronic book accessible through the World Wide Web; click for information
Online resource:
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491358
ISBN:
9781597491358
Botnetsthe killer web app /
Schiller, Craig A.
Botnets
the killer web app /[electronic resource] :Craig A. Schiller ... [et al.]. - Rockland, MA :Syngress Publishing,c2007. - xv, 464 p. :ill. ;23 cm.
Includes index.
Botnets: A Call to Action -- Botnets Overview -- Alternative Botnet C&Cs -- Common Botnets -- Botnet Detection: Tools and Techniques -- Ourmon: Overview and Installation -- Ourmon: Anomaly Detection Tools -- IRC and Botnets -- Advanced Ourmon Techniques -- Using Sandbox Tools for Botnets -- Intelligence Resources -- Responding to Botnets.
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets. * This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise * Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9781597491358
Source: 138456:138593Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
185597
Computer networks
--Security measures.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: TK5105.59 / .S345 2007eb
Dewey Class. No.: 005.8
Botnetsthe killer web app /
LDR
:02772nmm 2200325Ia 4500
001
214278
003
OCoLC
005
20090612093507.0
006
m d
007
cr cn|||||||||
008
090907s2007 maua s 001 0 eng d
020
$a
9781597491358
020
$a
1597491357
029
1
$a
NZ1
$b
11778362
035
$a
(OCoLC)162131556
035
$a
ocn162131556
037
$a
138456:138593
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
049
$a
TEFA
050
1 4
$a
TK5105.59
$b
.S345 2007eb
082
0 4
$a
005.8
$2
22
100
1
$a
Schiller, Craig A.
$3
340413
245
1 0
$a
Botnets
$h
[electronic resource] :
$b
the killer web app /
$c
Craig A. Schiller ... [et al.].
260
$a
Rockland, MA :
$c
c2007.
$b
Syngress Publishing,
300
$a
xv, 464 p. :
$b
ill. ;
$c
23 cm.
500
$a
Includes index.
505
0
$a
Botnets: A Call to Action -- Botnets Overview -- Alternative Botnet C&Cs -- Common Botnets -- Botnet Detection: Tools and Techniques -- Ourmon: Overview and Installation -- Ourmon: Anomaly Detection Tools -- IRC and Botnets -- Advanced Ourmon Techniques -- Using Sandbox Tools for Botnets -- Intelligence Resources -- Responding to Botnets.
520
$a
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets. * This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise * Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on July 25, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Web sites
$x
Security measures.
$3
231025
650
0
$a
Computer security.
$3
184416
655
7
$a
Electronic books.
$2
local.
$3
214472
710
2
$a
ScienceDirect (Online service)
$3
307425
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597491358
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491358
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000028803
電子館藏
1圖書
電子書
EB TK5105.59 S334 2007
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://www.sciencedirect.com/science/book/9781597491358
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491358
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login