It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_2016/BooksAll.2016.part35.utf8:162947374:1307
Source Library of Congress
Download Link /show-records/marc_loc_2016/BooksAll.2016.part35.utf8:162947374:1307?format=raw

LEADER: 01307cam a22003017a 4500
001 2008270325
003 DLC
005 20080201091512.0
008 080116s2008 maua 001 0 eng d
010 $a 2008270325
020 $a1597492248
020 $a9781597492249 (pbk.)
035 $a(OCoLC)ocn170922388
040 $aYDXCP$cYDXCP$dBAKER$dBTCTA$dMOU$dDLC
042 $alccopycat
050 00 $aQA76.9.D314$bI565 2008
245 00 $aInfosecurity 2008 threat analysis /$c[authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford.
246 30 $aThreat analysis
260 $aBurlington, MA :$bSyngress Publishing,$cc2008.
300 $axxiv, 442 p. :$bill. ;$c24 cm.
500 $aIncludes index.
505 0 $aBotnets : a call to action -- Botnets overview -- Cross-site scripting fundamentals -- XSS theory -- XSS attack methods -- Protecting critical infrastructure : process control and SCADA -- Final thoughts -- Why PCI is important -- Protect cardholder data -- Understanding and taking advantage of VoIP protocols -- Asterisk hardware ninjutsu -- Social engineering.
650 0 $aDatabase security.
650 0 $aComputer security.
650 0 $aData protection.
650 0 $aComputers$xAccess control.
650 0 $aTelecommunication$xSecurity measures.
700 1 $aClark, Champ,$cIII.