Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyber security essentials /
~
Olson, Ryan, (1981-.)
Cyber security essentials /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Cyber security essentials // edited by James Graham, Richard Howard, and Ryan Olson.
other author:
Graham, James
Published:
Boca Raton :Auerbach Publications, : 2011.,
Description:
xv, 325 p. :ill. ; : 24 cm.;
Subject:
Computer security. -
ISBN:
9781439851234 (Pbk) :
Cyber security essentials /
Cyber security essentials /
edited by James Graham, Richard Howard, and Ryan Olson. - Boca Raton :Auerbach Publications,2011. - xv, 325 p. :ill. ;24 cm.
Includes bibliographical references and index.
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
ISBN: 9781439851234 (Pbk) :NT2124Subjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25 / C91915 2011
Dewey Class. No.: 005.8
Cyber security essentials /
LDR
:01165cam a2200157 a 4500
001
709292
008
120828s2011 flu b 001 0 eng
020
$a
9781439851234 (Pbk) :
$c
NT2124
035
$a
16548122
040
$a
DLC
$c
DLC
$d
DLC
$c
NFU
050
0 0
$a
QA76.9.A25
$b
C91915 2011
082
0 0
$a
005.8
$2
22
245
0 0
$a
Cyber security essentials /
$c
edited by James Graham, Richard Howard, and Ryan Olson.
260
$a
Boca Raton :
$c
2011.
$b
Auerbach Publications,
300
$a
xv, 325 p. :
$b
ill. ;
$c
24 cm.
504
$a
Includes bibliographical references and index.
520
$a
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
$c
Provided by publisher.
650
0
$a
Computer security.
$3
557122
700
1
$a
Graham, James
$q
(James John George)
$3
808027
700
1
$a
Howard, Richard,
$d
1959-.
$3
838130
700
1
$a
Olson, Ryan,
$d
1981-.
$3
838131
based on 0 review(s)
ALL
圖書館3F 書庫
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
E036910
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
005.8 C994 2010
一般使用(Normal)
On shelf
0
Reserve
1 records • Pages 1 •
1
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login