000 01689cam a22003617a 4500
001 ocm15144819
005 20240430144428.0
008 080116s2008 maua 001 0 eng d
010 _a 2008270325
020 _a1597492248
020 _a9781597492249 (pbk.)
050 0 0 _aQA76.9.D314
_bI565 2008
090 _aQA 76.9. D314 I565 2008
245 0 0 _aInfosecurity 2008 threat analysis /
_c[authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford.
246 3 0 _aThreat analysis
260 _aBurlington, MA :
_bSyngress Publishing,
_cc2008.
300 _axxiv, 442 p. :
_bill. ;
_c24 cm.
500 _aIncludes index.
505 0 _aBotnets : a call to action -- Botnets overview -- Cross-site scripting fundamentals -- XSS theory -- XSS attack methods -- Protecting critical infrastructure : process control and SCADA -- Final thoughts -- Why PCI is important -- Protect cardholder data -- Understanding and taking advantage of VoIP protocols -- Asterisk hardware ninjutsu -- Social engineering.
650 0 _aDatabase security.
_9127775
650 0 _aComputer security.
_9127776
650 0 _aData protection.
_9127777
650 0 _aComputers
_xAccess control.
_9127778
650 0 _aTelecommunication
_xSecurity measures.
_9127779
700 1 _aClark, Champ,
_cIII.
_9127780
852 _9p59.95
_y05-11-2009
907 _a22350
_b08-06-10
_c08-06-10
942 _cBOOK
_00
998 _aaudmc
_b05-11-09
_cm
_da
_e-
_feng
_gmau
_h0
905 _aPR34566
953 _a04302009
945 _g0
_i602056
_j0
_laudmc
_nCopy Type:01 - Books
_o-
_p220.32
_q-
_r-
_s-
_t1
_u0
_v0
_w0
_x0
_yi10294430
_z08-06-10
999 _c22350
_d22350