Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Aggressive network self-defense
~
Archibald, Neil.
Linked to FindBook
Google Book
Amazon
博客來
Aggressive network self-defense
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Aggressive network self-defense/ Neil Archibald ... [et al.] ; technical editor Neil R. Wyler (aka Grifter), foreword by Timothy M. Mullen (Thor).
other author:
Archibald, Neil.
Published:
Rockland, MA :Syngress Pub., : c2005.,
Description:
xxx, 383 p. :ill. ;24 cm.
[NT 15003449]:
Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough.
Subject:
Computer networks - Security measures. -
Online resource:
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781931836203An electronic book accessible through the World Wide Web; click for information
Online resource:
http://www.sciencedirect.com/science/book/9781931836203An electronic book accessible through the World Wide Web; click for information
ISBN:
1931836205
Aggressive network self-defense
Aggressive network self-defense
[electronic resource] /Neil Archibald ... [et al.] ; technical editor Neil R. Wyler (aka Grifter), foreword by Timothy M. Mullen (Thor). - Rockland, MA :Syngress Pub.,c2005. - xxx, 383 p. :ill. ;24 cm.
Includes bibliographical references and index.
Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough.
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker. *First book to demonstrate and explore controversial network strike back and countermeasure techniques. *Provides tightly guarded secrets to find out WHO is really attacking you over the internet. *Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 1931836205
Source: 112087:112175Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
579161
Computer networks
--Security measures.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: QA76.9.A25 / A447 2005eb
Dewey Class. No.: 005.8
Aggressive network self-defense
LDR
:03015cam 2200325 a 45
001
892778
003
OCoLC
005
20101126
006
m d
007
cr cn|||||||||
008
101126s2005 maua ob 001 0 eng d
020
$a
1931836205
020
$a
9781931836203
035
$a
(OCoLC)162721189
035
$a
ocn162721189
037
$a
112087:112175
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
049
$a
TEFA
050
1 4
$a
QA76.9.A25
$b
A447 2005eb
050
1 4
$a
TK5105.59
$b
.A387 2005eb
082
0 4
$a
005.8
$2
22
245
0 0
$a
Aggressive network self-defense
$h
[electronic resource] /
$c
Neil Archibald ... [et al.] ; technical editor Neil R. Wyler (aka Grifter), foreword by Timothy M. Mullen (Thor).
260
$a
Rockland, MA :
$c
c2005.
$b
Syngress Pub.,
300
$a
xxx, 383 p. :
$b
ill. ;
$c
24 cm.
504
$a
Includes bibliographical references and index.
505
0
$a
Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough.
520
$a
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker. *First book to demonstrate and explore controversial network strike back and countermeasure techniques. *Provides tightly guarded secrets to find out WHO is really attacking you over the internet. *Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Computer security.
$3
540555
650
0
$a
Internet
$x
Security measures.
$3
590477
655
7
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Archibald, Neil.
$3
622652
700
1
$a
Mullen, Timothy M.
$3
1067916
700
1
$a
Wyler, Neil R.
$3
1067917
710
2
$a
ScienceDirect (Online service)
$3
848416
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781931836203
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781931836203
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9084859
電子資源
11.線上閱覽_V
電子書
EB W9084859
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login