Image from Google Jackets

Cyber security essentials / edited by James Graham, Richard Howard, Ryan Olson.

Contributor(s): Material type: TextTextPublication details: Boca Raton, FL : Auerbach Publications, c2011.Description: xv, 325 p. : ill. ; 24 cmISBN:
  • 9781439851234 (pbk.)
  • 1439851239 (pbk.)
Subject(s): DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 C91915 2011
Available additional physical forms:
  • Also available online.
Summary: "A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books MAIN General AUE Library Collection QA76.9 .A25 C91915 2011 (Browse shelf(Opens below)) 1 Available 10024131
Books Books MAIN General AUE Library Collection QA76.9 .A25 C91915 2011 (Browse shelf(Opens below)) 2 Available 10024141

"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"-- Provided by publisher.

Includes bibliographical references and index.

Also available online.

There are no comments on this title.

to post a comment.