Combating spyware in the enterprise:
Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate econ...
Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Rockland, MA
Syngress
2006
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597490641/?ar |
Zusammenfassung: | Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate economy and network of malicious hackers and criminals. |
Beschreibung: | Includes index. - Print version record |
Umfang: | 1 Online-Ressource (xx, 386 Seiten) illustrations |
ISBN: | 0080502229 9780080502229 9781597490641 1597490644 1429416580 9781429416580 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-054865557 | ||
003 | DE-627-1 | ||
005 | 20240228114515.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200807s2006 xx |||||o 00| ||eng c | ||
020 | |a 0080502229 |9 0-08-050222-9 | ||
020 | |a 9780080502229 |9 978-0-08-050222-9 | ||
020 | |a 9781597490641 |9 978-1-59749-064-1 | ||
020 | |a 1597490644 |9 1-59749-064-4 | ||
020 | |a 1429416580 |c electronic bk. |9 1-4294-1658-0 | ||
020 | |a 9781429416580 |c electronic bk. |9 978-1-4294-1658-0 | ||
035 | |a (DE-627-1)054865557 | ||
035 | |a (DE-599)KEP054865557 | ||
035 | |a (ORHE)9781597490641 | ||
035 | |a (DE-627-1)054865557 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Combating spyware in the enterprise |c Brian Baskin [and others] ; Tony Piltzecker, technical editor |
246 | 3 | 3 | |a Spyware in the enterprise |
264 | 1 | |a Rockland, MA |b Syngress |c 2006 | |
300 | |a 1 Online-Ressource (xx, 386 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Print version record | ||
520 | |a Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate economy and network of malicious hackers and criminals. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Spyware (Computer software) | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Logiciels espions | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer security | |
650 | 4 | |a Spyware (Computer software) | |
700 | 1 | |a Baskin, Brian |e MitwirkendeR |4 ctb | |
700 | 1 | |a Piltzecker, Tony |d 1975- |e MitwirkendeR |4 ctb | |
776 | 1 | |z 1597490644 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597490644 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597490641/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-054865557 |
---|---|
_version_ | 1821494838897410048 |
adam_text | |
any_adam_object | |
author2 | Baskin, Brian Piltzecker, Tony 1975- |
author2_role | ctb ctb |
author2_variant | b b bb t p tp |
author_facet | Baskin, Brian Piltzecker, Tony 1975- |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)054865557 (DE-599)KEP054865557 (ORHE)9781597490641 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02416cam a22006012 4500</leader><controlfield tag="001">ZDB-30-ORH-054865557</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114515.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200807s2006 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080502229</subfield><subfield code="9">0-08-050222-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080502229</subfield><subfield code="9">978-0-08-050222-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490641</subfield><subfield code="9">978-1-59749-064-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490644</subfield><subfield code="9">1-59749-064-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429416580</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4294-1658-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429416580</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4294-1658-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)054865557</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP054865557</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597490641</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)054865557</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Combating spyware in the enterprise</subfield><subfield code="c">Brian Baskin [and others] ; Tony Piltzecker, technical editor</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Spyware in the enterprise</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 386 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate economy and network of malicious hackers and criminals.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Spyware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels espions</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Spyware (Computer software)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baskin, Brian</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Piltzecker, Tony</subfield><subfield code="d">1975-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1597490644</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597490644</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597490641/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-054865557 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:45Z |
institution | BVB |
isbn | 0080502229 9780080502229 9781597490641 1597490644 1429416580 9781429416580 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xx, 386 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress |
record_format | marc |
spelling | Combating spyware in the enterprise Brian Baskin [and others] ; Tony Piltzecker, technical editor Spyware in the enterprise Rockland, MA Syngress 2006 1 Online-Ressource (xx, 386 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Print version record Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate economy and network of malicious hackers and criminals. Computer security Spyware (Computer software) Computer Security Sécurité informatique Logiciels espions COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Baskin, Brian MitwirkendeR ctb Piltzecker, Tony 1975- MitwirkendeR ctb 1597490644 Erscheint auch als Druck-Ausgabe 1597490644 |
spellingShingle | Combating spyware in the enterprise Computer security Spyware (Computer software) Computer Security Sécurité informatique Logiciels espions COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
title | Combating spyware in the enterprise |
title_alt | Spyware in the enterprise |
title_auth | Combating spyware in the enterprise |
title_exact_search | Combating spyware in the enterprise |
title_full | Combating spyware in the enterprise Brian Baskin [and others] ; Tony Piltzecker, technical editor |
title_fullStr | Combating spyware in the enterprise Brian Baskin [and others] ; Tony Piltzecker, technical editor |
title_full_unstemmed | Combating spyware in the enterprise Brian Baskin [and others] ; Tony Piltzecker, technical editor |
title_short | Combating spyware in the enterprise |
title_sort | combating spyware in the enterprise |
topic | Computer security Spyware (Computer software) Computer Security Sécurité informatique Logiciels espions COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
topic_facet | Computer security Spyware (Computer software) Computer Security Sécurité informatique Logiciels espions COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
work_keys_str_mv | AT baskinbrian combatingspywareintheenterprise AT piltzeckertony combatingspywareintheenterprise AT baskinbrian spywareintheenterprise AT piltzeckertony spywareintheenterprise |