Item Details

Print View

Syngress Force Emerging Threat Analysis [electronic resource]: From Mischief to Malicious

Haldeman, Joe; Graham,Robert
Format
EBook; Book; Online
Published
Butterworth-Heinemann [Imprint] Jan. 2009 San Diego : Elsevier Science & Technology Books Los Angeles : Sony Electronics [Distributor]
Language
English
ISBN
9780080475592, 0080475590 (E-Book)
Summary
Annotation
Description
Mode of access: World wide Web.
Copyright Not EvaluatedCopyright Not Evaluated
Technical Details
  • Access in Virgo Classic
  • Staff View

    LEADER 02964cam a22003012 4500
    001 u5815867
    003 SIRSI
    005 20160208132457.0
    006 m d
    007 cr n
    008 090112e20090107mou s|||||||| ||eng|d
    020
      
      
    a| 9780080475592
    020
      
      
    a| 0080475590 (E-Book) c| USD 51.95 Retail Price (Sony Electronics) 9| Active Record
    035
      
      
    a| (WaSeSS)ssj0000254762
    037
      
      
    b| 00991439
    040
      
      
    a| BIP US d| WaSeSS
    100
    1
      
    a| Haldeman, Joe d| 1943- e| Author
    245
    1
    0
    a| Syngress Force Emerging Threat Analysis h| [electronic resource]: b| From Mischief to Malicious
    260
      
      
    b| Butterworth-Heinemann [Imprint] c| Jan. 2009 a| San Diego : b| Elsevier Science & Technology Books a| Los Angeles : b| Sony Electronics [Distributor]
    520
    8
      
    a| Annotation b| A One-Stop Reference Containing the Most Read Topics in the Syngress Security LibraryThis Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats TodayThis is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the "best of" this year's top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future.. * From Practical VoIP Security, Thomas Porter, Ph.D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security. * From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents the latest information on phishing and spam. * From Combating Spyware in the Enterprise, Brian Baskin, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and removal of spyware. * Also from Combating Spyware in the Enterprise, About.com's security expert Tony Bradley covers the transformation of spyware. * From Inside the SPAM Cartel, Spammer-X shows how spam is created and why it works so well. * From Securing IM and P2P Applications for the Enterprise, Paul Piccard, former manager of Internet Security Systems' Global Threat Operations Center, covers Skype security. * Also from Securing IM and P2P Applications for the Enterprise, Craig Edwards, creator of the IRC security software IRC Defender, discusses global IRC security. * From RFID Security, Brad "Renderman" Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application attacks. * Also from R
    538
      
      
    a| Mode of access: World wide Web.
    655
      
    0
    a| Electronic books.
    700
    1
      
    a| Graham,Robert e| Author
    710
    2
      
    a| Safari Books Online
    856
    4
    0
    u| http://RE5QY4SB7X.search.serialssolutions.com/?V=1.0&L=RE5QY4SB7X&S=JCs&C=TC0000254762&T=marc
    596
      
      
    a| 1
    999
      
      
    a| XX(5815867.1) w| WEB i| 5815867-1001 l| INTERNET m| UVA-LIB t| INTERNET
▾See more
▴See less

Availability

Google Preview

Google Books Preview

Read Online