Please use this identifier to cite or link to this item: https://lib.hpu.edu.vn/handle/123456789/21227
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMonte, Matthewen_US
dc.date.accessioned2016-06-10T08:32:47Z
dc.date.available2016-06-10T08:32:47Z
dc.date.issued2015en_US
dc.identifier.isbn978-1-118-98712-4en_US
dc.identifier.isbn978-1-118-98708-7en_US
dc.identifier.isbn978-1-118-98723-0en_US
dc.identifier.otherHPU1160052en_US
dc.identifier.urihttps://lib.hpu.edu.vn/handle/123456789/21227-
dc.description.abstractThis book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals.en_US
dc.format.extent219 p.en_US
dc.format.mimetypeapplication/pdf-
dc.language.isoenen_US
dc.publisherWileyen_US
dc.subjectComputer networksen_US
dc.subjectFrameworken_US
dc.subjectComputer securityen_US
dc.subjectBusiness enterprisesen_US
dc.titleNetwork attacks and exploitation: a frameworken_US
dc.typeBooken_US
dc.size25,047KBen_US
dc.departmentEnglish resourcesen_US
Appears in Collections:Technology

Files in This Item:
File Description SizeFormat 
13_Networkattacksandexploitation.pdf
  Restricted Access
25.05 MBAdobe PDFThumbnail
View/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.