000 | 03112nam a22003975i 4500 | ||
---|---|---|---|
001 | 279241 | ||
003 | MX-SnUAN | ||
005 | 20160429153937.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2008 xxu| o |||| 0|eng d | ||
020 |
_a9780387743905 _99780387743905 |
||
024 | 7 |
_a10.1007/9780387743905 _2doi |
|
035 | _avtls000332492 | ||
039 | 9 |
_a201509030749 _bVLOAD _c201404122148 _dVLOAD _c201404091918 _dVLOAD _y201402041030 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.9.A25 | |
100 | 1 |
_aSingh, Abhishek. _eeditor. _9303454 |
|
245 | 1 | 0 |
_aVulnerability Analysis and Defense for the Internet / _cedited by Abhishek Singh, Baibhav Singh, Hirosh Joseph. |
264 | 1 |
_aBoston, MA : _bSpringer US, _c2008. |
|
300 | _brecurso en línea. | ||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v37 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aWireless Security -- Vulnerability Analysis for Mail Protocols -- Vulnerability Analysis for FTP and TFTP -- Vulnerability Analysis for HTTP -- Vulnerability Analysis for DNS and DHCP -- Vulnerability Analysis for SNMP and LDAP -- Vulnerability Analysis for RPC -- Malware Analysis -- Reverse Engineering. | |
520 | _aVulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or an application. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, which enables a user to identify whether an application/protocol is vulnerable and how the vulnerability affects the software. If an application is vulnerable, then a user will be able to understand the complexity, and the theory behind the vulnerability. This edited volume contributed by world leaders in this field, also provides psuedo code for effective signatures to prevent vulnerabilities and case studies where the latest exploits are discussed. Vulnerability Analysis and Defense for the Internet is designed for a professional audience composed of practitioners and researchers in industry. This book is also useful as an advanced-level secondary text book in computer science. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aSingh, Baibhav. _eeditor. _9303455 |
|
700 | 1 |
_aJoseph, Hirosh. _eeditor. _9303456 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9780387743899 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-0-387-74390-5 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c279241 _d279241 |