Crimeware : (Record no. 601)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090505s2008 njua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2007050736
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0321501950
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u1545
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
245 00 - TITLE STATEMENT
Title Crimeware :
Remainder of title understanding new attacks and defenses /
Statement of responsibility, etc. Markus Jakobsson, Zulfikar Ramzan.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Upper Saddle River, NJ :
Name of publisher, distributor, etc. Addison-Wesley,
Date of publication, distribution, etc. c2008.
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 582 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. 525-556) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Overview of crimeware -- A taxonomy of coding errors -- Crimeware and peer-to-peer networks -- Crimeware in small devices -- Crimeware in firmware -- Crimeware in the browser -- Bot networks -- Rootkits -- Virtual worlds and fraud -- Cybercrime and politics -- Online advertising fraud -- Crimeware business models -- The educational aspect of security -- Surreptitious code and the law -- Crimeware and trusted computing -- Technical defense techniques -- The future of crimeware.
520 ## - SUMMARY, ETC.
Summary, etc. This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference." -Garth Bruen, Project Knuj On Designer There's a new breed of online predators-serious criminals intent on stealing big bucks and top-secret information-and their weapons of choice are a dangerous array of tools called "crimeware." With an ever-growing number of companies
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 1926
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
General subdivision Security measures.
9 (RLIN) 1927
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
9 (RLIN) 1928
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Jakobsson, Markus.
9 (RLIN) 1929
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ramzan, Zulfikar.
9 (RLIN) 1930
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 12/29/2014 AHRA-P   005.8 / JA.C 2008 002923 11/24/2019 1 11/24/2019 Books
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 ACA-P   005.8 / JA.C 2008 002773 11/24/2019 2 11/24/2019 Books