000 | 03182nam a22004337i 4500 | ||
---|---|---|---|
999 |
_c76188 _d76188 |
||
005 | 20230801213950.0 | ||
008 | 180404b2011 xxua|||fr|||| 001 0 eng d | ||
020 | _a8781439851234 | ||
040 |
_aCO-UCAC _beng _cCO-UCAC _erda |
||
041 | 0 | _beng | |
043 | _axxu | ||
082 | 0 | 4 |
_222 _a005.8 _c052 |
100 | 1 |
_93472 _aOlson, Ryan |
|
245 | 1 | 0 |
_aCyber security essentials / _cRyan Olson y otros nueve ; edited by James Graham and Richard Howard |
264 | 1 |
_aBoca Raton : _bCRC Press : Taylor & Francis Group, _c2011. |
|
300 |
_a325 páginas, _bilustraciones ; _c16 x 23 cm. _f1 ejemplar |
||
336 |
_2rdacontenido _aTexto |
||
337 |
_2rdamedio _aNo mediado |
||
338 |
_2rdasoporte _aVolumen |
||
504 | _aIncluye bibliografía | ||
505 | _aChapter 1. Cyber security fundamentals. Chapter 2. Attacker techniques and motivations. Chapter 3. Exploitation. Chapter 4. Malicious code. Chapter 5. Defense and analysis techniques. Chapter 6. iDefense special file investigation tools. | ||
506 | _aSistemas | ||
520 | 3 | _aThe sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures. | |
520 | 3 | _aTo accomplish this, the team of security professionals from VeriSign’s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: | |
520 | 3 | _a• Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors • Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding • Supplies actionable advice for the mitigation of threats • Breaks down the code used to write exploits into understandable diagrams | |
520 | 3 | _aThis book is not about the latest attack trends or botnets. It’s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon. | |
650 | 0 | 7 |
_2Armarc _aSEGURIDAD EN COMPUTADORES _9241028 |
650 | 0 | 7 |
_2Armarc _aPROTECCIÓN DE DATOS _93474 |
700 | 1 |
_aLigh, Michael _eautor _93475 |
|
700 | 1 |
_aSinclair, Greg _eautor _93476 |
|
700 | 1 |
_aHartstein, Blake _eautor _93477 |
|
700 | 1 |
_aSudusinghe, Shahan _eautor _93478 |
|
700 | 1 |
_aGary, Jon _eautor _93479 |
|
700 | 1 |
_aFalcone, Robert _eautor _93480 |
|
700 | 1 |
_aMata, Aldrich da _eautor _93481 |
|
700 | 1 |
_aSmith, Ryan _eautor _93482 |
|
700 | 1 |
_aLawrence, Arion _eautor _93483 |
|
942 |
_2ddc _cBK |