語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber security essentials /
~
Olson, Ryan, (1981-.)
Cyber security essentials /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyber security essentials // edited by James Graham, Richard Howard, and Ryan Olson.
其他作者:
Graham, James
出版者:
Boca Raton :Auerbach Publications, : 2011.,
面頁冊數:
xv, 325 p. :ill. ; : 24 cm.;
標題:
Computer security. -
ISBN:
9781439851234 (Pbk) :
Cyber security essentials /
Cyber security essentials /
edited by James Graham, Richard Howard, and Ryan Olson. - Boca Raton :Auerbach Publications,2011. - xv, 325 p. :ill. ;24 cm.
Includes bibliographical references and index.
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
ISBN: 9781439851234 (Pbk) :NT2124Subjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25 / C91915 2011
Dewey Class. No.: 005.8
Cyber security essentials /
LDR
:01165cam a2200157 a 4500
001
709292
008
120828s2011 flu b 001 0 eng
020
$a
9781439851234 (Pbk) :
$c
NT2124
035
$a
16548122
040
$a
DLC
$c
DLC
$d
DLC
$c
NFU
050
0 0
$a
QA76.9.A25
$b
C91915 2011
082
0 0
$a
005.8
$2
22
245
0 0
$a
Cyber security essentials /
$c
edited by James Graham, Richard Howard, and Ryan Olson.
260
$a
Boca Raton :
$c
2011.
$b
Auerbach Publications,
300
$a
xv, 325 p. :
$b
ill. ;
$c
24 cm.
504
$a
Includes bibliographical references and index.
520
$a
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--
$c
Provided by publisher.
650
0
$a
Computer security.
$3
557122
700
1
$a
Graham, James
$q
(James John George)
$3
808027
700
1
$a
Howard, Richard,
$d
1959-.
$3
838130
700
1
$a
Olson, Ryan,
$d
1981-.
$3
838131
筆 0 讀者評論
全部
圖書館3F 書庫
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
E036910
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
005.8 C994 2010
一般使用(Normal)
在架
0
預約
1 筆 • 頁數 1 •
1
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入