skip to content
Defend I.T. : security by example Preview this item
ClosePreview this item
Checking...

Defend I.T. : security by example

Author: Ajay Gupta; Scott Laliberte
Publisher: Boston : Addison-Wesley, ©2004.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
Annotation
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Gupta, Ajay.
Defend I.T.
Boston : Addison-Wesley, ©2004
(DLC) 2004004424
(OCoLC)54543983
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Ajay Gupta; Scott Laliberte
ISBN: 0321197674 9780321197672
OCLC Number: 57254682
Reproduction Notes: Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL
Description: 1 online resource (xxviii, 349 pages) : illustrations
Details: Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Contents: pt. I. Basic hacking --
Ch. 1. Getting to know the enemy : Nmap the target network --
Ch. 2. Home architecture --
Ch. 3. No service for you! --
pt. II. Current methods --
Ch. 4. Look, Ma, no wires! --
Ch. 5. Virus outbreak I --
Ch. 6. Virus outbreak II : the worm --
Ch. 7. Changing face --
pt. III. Additional items on the plate --
Ch. 8. Protecting borders : perimeter defense with an IDS --
Ch. 9. Disaster all around --
Ch. 10. Security is the best policy --
Ch. 11. HIPAA : security by regulation --
pt. IV. Old school --
Ch. 12. war-dialing attack --
Ch. 13. low-tech path into the high-tech world --
pt. V. Computer forensics --
Ch. 14. Industrial espionage --
Ch. 15. Executive fraud --
Ch. 16. Cyber extortion.
Other Titles: Defend IT, security by example
Security by example, defend I.T.
Responsibility: Ajay Gupta, Scott Laliberte.

Abstract:

Includes case studies, which are used to demonstrate important security principles. This work contains an approach that is useful in the security space, where companies and consultants are often  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/57254682> # Defend I.T. : security by example
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "57254682" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    library:placeOfPublication <http://dbpedia.org/resource/Boston> ; # Boston
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:alternateName "Security by example, defend I.T." ;
    schema:alternateName "Defend IT, security by example" ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/65811541> ; # Scott Laliberte
    schema:copyrightYear "2004" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/858246314#Person/gupta_ajay> ; # Ajay Gupta
    schema:datePublished "2004" ;
    schema:description "Annotation"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/858246314> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/54543983> ;
    schema:name "Defend I.T. : security by example"@en ;
    schema:productID "57254682" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/57254682#PublicationEvent/boston_addison_wesley_2004> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/858246314#Agent/addison_wesley> ; # Addison-Wesley
    schema:url <http://catalog.hathitrust.org/api/volumes/oclc/54543983.html> ;
    schema:url <http://books.google.com/books?id=BexSAAAAMAAJ> ;
    schema:url <http://proquest.safaribooksonline.com/0321197674> ;
    schema:workExample <http://worldcat.org/isbn/9780321197672> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/57254682> ;
    .


Related Entities

<http://dbpedia.org/resource/Boston> # Boston
    a schema:Place ;
    schema:name "Boston" ;
    .

<http://experiment.worldcat.org/entity/work/data/858246314#Agent/addison_wesley> # Addison-Wesley
    a bgn:Agent ;
    schema:name "Addison-Wesley" ;
    .

<http://experiment.worldcat.org/entity/work/data/858246314#Person/gupta_ajay> # Ajay Gupta
    a schema:Person ;
    schema:familyName "Gupta" ;
    schema:givenName "Ajay" ;
    schema:name "Ajay Gupta" ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/65811541> # Scott Laliberte
    a schema:Person ;
    schema:familyName "Laliberte" ;
    schema:givenName "Scott" ;
    schema:name "Scott Laliberte" ;
    .

<http://worldcat.org/isbn/9780321197672>
    a schema:ProductModel ;
    schema:isbn "0321197674" ;
    schema:isbn "9780321197672" ;
    .

<http://www.worldcat.org/oclc/54543983>
    a schema:CreativeWork ;
    rdfs:label "Defend I.T." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/57254682> ; # Defend I.T. : security by example
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.