The Resource Infosecurity 2008 threat analysis, [authors, Champ Clark III [and others] ; foreword by Richard Ford
Infosecurity 2008 threat analysis, [authors, Champ Clark III [and others] ; foreword by Richard Ford
Resource Information
The item Infosecurity 2008 threat analysis, [authors, Champ Clark III [and others] ; foreword by Richard Ford represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri-St. Louis Libraries.This item is available to borrow from 1 library branch.
Resource Information
The item Infosecurity 2008 threat analysis, [authors, Champ Clark III [and others] ; foreword by Richard Ford represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri-St. Louis Libraries.
This item is available to borrow from 1 library branch.
- Summary
- An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions. * Provides IT Security Professionals with a first look at likely new threats to their enterprise * Includes real-world examples of system intrusions and compromised data * Provides techniques and strategies to detect, prevent, and recover * Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence
- Language
- eng
- Extent
- 1 online resource (xxiv, 442 pages)
- Contents
-
- Botnets : a call to action
- Botnets overview
- Cross-site scripting fundamentals
- XSS theory
- XSS attack methods
- Protecting critical infrastructure : process control and SCADA
- Final thoughts
- Why PCI is important
- Protect cardholder data
- Understanding and taking advantage of VoIP protocols
- Asterisk hardware ninjutsu
- Social engineering
- Isbn
- 9786611273316
- Label
- Infosecurity 2008 threat analysis
- Title
- Infosecurity 2008 threat analysis
- Statement of responsibility
- [authors, Champ Clark III [and others] ; foreword by Richard Ford
- Title variation
- Threat analysis
- Subject
-
- Telecommunication -- Security measures
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Computers -- Access control
- Computers -- Access control
- Data protection
- Data protection
- Database security
- Database security
- Electronic books
- Telecommunication -- Security measures
- Language
- eng
- Summary
- An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions. * Provides IT Security Professionals with a first look at likely new threats to their enterprise * Includes real-world examples of system intrusions and compromised data * Provides techniques and strategies to detect, prevent, and recover * Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence
- Cataloging source
- OPELS
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- Language note
- English
- LC call number
- QA76.9.D314
- LC item number
- I565 2008eb
- Literary form
- non fiction
- Nature of contents
- dictionaries
- http://library.link/vocab/relatedWorkOrContributorName
- Clark, Champ
- http://library.link/vocab/subjectName
-
- Database security
- Computer security
- Data protection
- Computers
- Telecommunication
- COMPUTERS
- COMPUTERS
- COMPUTERS
- Computer security
- Computers
- Data protection
- Database security
- Telecommunication
- Label
- Infosecurity 2008 threat analysis, [authors, Champ Clark III [and others] ; foreword by Richard Ford
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Botnets : a call to action -- Botnets overview -- Cross-site scripting fundamentals -- XSS theory -- XSS attack methods -- Protecting critical infrastructure : process control and SCADA -- Final thoughts -- Why PCI is important -- Protect cardholder data -- Understanding and taking advantage of VoIP protocols -- Asterisk hardware ninjutsu -- Social engineering
- Control code
- 281598632
- Dimensions
- unknown
- Extent
- 1 online resource (xxiv, 442 pages)
- Form of item
- online
- Isbn
- 9786611273316
- Lccn
- 2008270325
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- 149068:149219
- Specific material designation
- remote
- System control number
- (OCoLC)281598632
- Label
- Infosecurity 2008 threat analysis, [authors, Champ Clark III [and others] ; foreword by Richard Ford
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Botnets : a call to action -- Botnets overview -- Cross-site scripting fundamentals -- XSS theory -- XSS attack methods -- Protecting critical infrastructure : process control and SCADA -- Final thoughts -- Why PCI is important -- Protect cardholder data -- Understanding and taking advantage of VoIP protocols -- Asterisk hardware ninjutsu -- Social engineering
- Control code
- 281598632
- Dimensions
- unknown
- Extent
- 1 online resource (xxiv, 442 pages)
- Form of item
- online
- Isbn
- 9786611273316
- Lccn
- 2008270325
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- 149068:149219
- Specific material designation
- remote
- System control number
- (OCoLC)281598632
Subject
- Telecommunication -- Security measures
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Computers -- Access control
- Computers -- Access control
- Data protection
- Data protection
- Database security
- Database security
- Electronic books
- Telecommunication -- Security measures
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.umsl.edu/portal/Infosecurity-2008-threat-analysis-authors/OakyML_ndi8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.umsl.edu/portal/Infosecurity-2008-threat-analysis-authors/OakyML_ndi8/">Infosecurity 2008 threat analysis, [authors, Champ Clark III [and others] ; foreword by Richard Ford</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.umsl.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.umsl.edu/">University of Missouri-St. Louis Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Infosecurity 2008 threat analysis, [authors, Champ Clark III [and others] ; foreword by Richard Ford
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.umsl.edu/portal/Infosecurity-2008-threat-analysis-authors/OakyML_ndi8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.umsl.edu/portal/Infosecurity-2008-threat-analysis-authors/OakyML_ndi8/">Infosecurity 2008 threat analysis, [authors, Champ Clark III [and others] ; foreword by Richard Ford</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.umsl.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.umsl.edu/">University of Missouri-St. Louis Libraries</a></span></span></span></span></div>