Matches in Library of Congress for { <http://lccn.loc.gov/2008270325> ?p ?o. }
Showing items 1 to 24 of
24
with 100 items per page.
- 2008270325 alternative "Threat analysis".
- 2008270325 contributor B11139494.
- 2008270325 created "c2008.".
- 2008270325 date "2008".
- 2008270325 date "c2008.".
- 2008270325 dateCopyrighted "c2008.".
- 2008270325 description "Botnets : a call to action -- Botnets overview -- Cross-site scripting fundamentals -- XSS theory -- XSS attack methods -- Protecting critical infrastructure : process control and SCADA -- Final thoughts -- Why PCI is important -- Protect cardholder data -- Understanding and taking advantage of VoIP protocols -- Asterisk hardware ninjutsu -- Social engineering.".
- 2008270325 extent "xxiv, 442 p. :".
- 2008270325 identifier "1597492248".
- 2008270325 identifier "9781597492249 (pbk.)".
- 2008270325 issued "2008".
- 2008270325 issued "c2008.".
- 2008270325 language "eng".
- 2008270325 publisher "Burlington, MA : Syngress Publishing,".
- 2008270325 subject "Computer security.".
- 2008270325 subject "Computers Access control.".
- 2008270325 subject "Data protection.".
- 2008270325 subject "Database security.".
- 2008270325 subject "QA76.9.D314 I565 2008".
- 2008270325 subject "Telecommunication Security measures.".
- 2008270325 tableOfContents "Botnets : a call to action -- Botnets overview -- Cross-site scripting fundamentals -- XSS theory -- XSS attack methods -- Protecting critical infrastructure : process control and SCADA -- Final thoughts -- Why PCI is important -- Protect cardholder data -- Understanding and taking advantage of VoIP protocols -- Asterisk hardware ninjutsu -- Social engineering.".
- 2008270325 title "Infosecurity 2008 threat analysis / [authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford.".
- 2008270325 title "Threat analysis".
- 2008270325 type "text".