//]]>

Botnets (Record no. 21205)

000 -LEADER
fixed length control field 03420nam a22005055i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310151112.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130703s2013 xxk| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781447152163
978-1-4471-5216-3
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
264 #1 -
-- London :
-- Springer London :
-- Imprint: Springer,
-- 2013.
912 ## -
-- ZDB-2-SCS
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Tiirmaa-Klaar, Heli.
Relator term author.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Botnets
Medium [electronic resource] /
Statement of responsibility, etc by Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla, Peter Martini.
300 ## - PHYSICAL DESCRIPTION
Extent VIII, 97 p. 5 illus.
Other physical details online resource.
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE
Title SpringerBriefs in Cybersecurity,
International Standard Serial Number 2193-973X
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Foreword -- Botnets, Cybercrime and National Security -- Botnets: How to Fight the Ever-growing Threat on a Technical Level.
520 ## - SUMMARY, ETC.
Summary, etc Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary commands on the infected machines makes botnets a general-purpose tool to perform malicious cyber-activities. Botnets provides a comprehensive analysis of the topic, and comprises both technical and non-technical sections written by leading cybersecurity experts. The non-technical section addresses how botnet infrastructure could be exploited for national security and cybercrime purposes. It approaches the subject as a public policy issue and analyzes the phenomenon of botnets from national security, law enforcement and regulatory policy perspectives, and makes recommendations for policy-makers on different public policies, highlighting the need for international response mechanisms. The technical section provides insight into current botnet techniques and discusses state-of-the-art countermeasures to combat the botnet threat in detail. It includes new detection methods as well as different approaches to actively compromise running botnets.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
Topical term or geographic name as entry element Computer network architectures.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Data protection.
Topical term or geographic name as entry element Information systems.
Topical term or geographic name as entry element Computer Science.
Topical term or geographic name as entry element Systems and Data Security.
Topical term or geographic name as entry element Computer Systems Organization and Communication Networks.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Information Systems and Communication Service.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gassen, Jan.
Relator term author.
Personal name Gerhards-Padilla, Elmar.
Relator term author.
Personal name Martini, Peter.
Relator term author.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9781447152156
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4471-5216-3
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-08AUM Main Library2014-04-08 2014-04-08 E-Book   AUM Main Library005.8

Languages: 
English |
العربية