Syngress force emerging threat analysis : from mischief to malicious /

Other Authors: Maynor, David.
Format: Book
Language:English
Published: Syngress force 2006 emerging threat analysis : from mischief to malicious Rockland, MA : Syngress Pub., ©2006.
Subjects:
Online Access:http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=174833
LEADER 02043nam a2200421 a 4500
001 1907550
005 20171111234744.0
008 070802s2006 maua o 001 0 eng d
020 |a 9781597490566 
020 |a 1597490563 
020 |a 9781429458191  |q (electronic bk.) 
020 |a 1429458194  |q (electronic bk.) 
020 |a 9780080475592 
020 |a 0080475590 
020 |a 9781597491587  |q (electronic bk. ;  |q Adobe Reader) 
020 |a 1597491586  |q (electronic bk. ; 
040 |a OPELS  |b eng  |e pn  |q Adobe Reader) 
050 4 |a QA76.9.A25  |b S975 2006eb 
240 1 0 |a Emerging threat analysis 
245 0 0 |a Syngress force emerging threat analysis :  |b from mischief to malicious /  |c David Maynor [and others]. 
246 3 0 |a Emerging threat analysis 
260 |a Syngress force 2006 emerging threat analysis : from mischief to malicious  |b Syngress Pub.,  |c ©2006.  |a Rockland, MA : 
300 |a 1 online resource (xxx, 610 pages) :  |b illustrations 
505 0 |a Chapter 1: Analysis of Future Threat Levels Chapter 2: Pocket PCs and Smart Phones Chapter 3: Bots and Bot Networks Chapter 4: Malware Attacks Chapter 5: VoIP and SPIT Chapter 6: Compromising Security Software Chapter 7: Attacking and Defending Embedded Devices Chapter 8: DMA Attacks Chapter 9: Second-Tier and Seeded Landscape Attacks Chapter 10: How Vulnerable are SCADA Systems? 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer crimes  |x Prevention. 
650 4 |a Computer security. 
650 4 |a Computer networks  |x Security measures. 
650 4 |a Computer crimes  |x Prevention. 
650 7 |a COMPUTERS  |x Internet  |x Security. 
650 7 |a COMPUTERS  |x Networking  |x Security. 
650 7 |a COMPUTERS  |x Security  |x General. 
650 7 |a Computer crimes  |x Prevention. 
650 7 |a Computer networks  |x Security measures. 
700 1 |a Maynor, David. 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=174833 
952 |a CY-NiOUC  |b 5a0466e66c5ad14ac1eefbc2  |c 998a  |d 945l  |e -  |t 1  |x m  |z Books