Crimeware : (Record no. 601)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 090505s2008 njua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2007050736 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0321501950 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u1545 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 245 00 - TITLE STATEMENT | |
| Title | Crimeware : |
| Remainder of title | understanding new attacks and defenses / |
| Statement of responsibility, etc. | Markus Jakobsson, Zulfikar Ramzan. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Upper Saddle River, NJ : |
| Name of publisher, distributor, etc. | Addison-Wesley, |
| Date of publication, distribution, etc. | c2008. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxi, 582 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references (p. 525-556) and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Overview of crimeware -- A taxonomy of coding errors -- Crimeware and peer-to-peer networks -- Crimeware in small devices -- Crimeware in firmware -- Crimeware in the browser -- Bot networks -- Rootkits -- Virtual worlds and fraud -- Cybercrime and politics -- Online advertising fraud -- Crimeware business models -- The educational aspect of security -- Surreptitious code and the law -- Crimeware and trusted computing -- Technical defense techniques -- The future of crimeware. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference." -Garth Bruen, Project Knuj On Designer There's a new breed of online predators-serious criminals intent on stealing big bucks and top-secret information-and their weapons of choice are a dangerous array of tools called "crimeware." With an ever-growing number of companies |
| 596 ## - | |
| -- | 1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 9 (RLIN) | 1926 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Internet |
| General subdivision | Security measures. |
| 9 (RLIN) | 1927 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer crimes. |
| 9 (RLIN) | 1928 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Jakobsson, Markus. |
| 9 (RLIN) | 1929 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Ramzan, Zulfikar. |
| 9 (RLIN) | 1930 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 12/29/2014 | AHRA-P | 005.8 / JA.C 2008 | 002923 | 11/24/2019 | 1 | 11/24/2019 | Books | |||||
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | ACA-P | 005.8 / JA.C 2008 | 002773 | 11/24/2019 | 2 | 11/24/2019 | Books |