Show simple item record

dc.contributor.authorMonte, Matthewen_US
dc.date.accessioned2016-06-10T08:32:47Z
dc.date.available2016-06-10T08:32:47Z
dc.date.issued2015en_US
dc.identifier.isbn978-1-118-98712-4en_US
dc.identifier.isbn978-1-118-98708-7en_US
dc.identifier.isbn978-1-118-98723-0en_US
dc.identifier.otherHPU1160052en_US
dc.identifier.urihttps://lib.hpu.edu.vn/handle/123456789/21227
dc.description.abstractThis book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals.en_US
dc.format.extent219 p.en_US
dc.format.mimetypeapplication/pdf
dc.language.isoenen_US
dc.publisherWileyen_US
dc.subjectComputer networksen_US
dc.subjectFrameworken_US
dc.subjectComputer securityen_US
dc.subjectBusiness enterprisesen_US
dc.titleNetwork attacks and exploitation: a frameworken_US
dc.typeBooken_US
dc.size25,047KBen_US
dc.departmentEnglish resourcesen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record