Client-Honeypots: Exploring Malicious Websites by - 5 Angebote vergleichen
Preise | 2013 | 2014 | 2016 | 2017 |
---|---|---|---|---|
Schnitt | € 47,73 | € 53,01 | € 64,10 | € 42,90 |
Nachfrage |
1
Symbolbild
Client-Honeypots: Exploring Malicious Websites
DE PB NW
ISBN: 9783486705263 bzw. 3486705261, in Deutsch, R Oldenbourg Verlag GmbH, Taschenbuch, neu.
Lieferung aus: Vereinigte Staaten von Amerika, Versandkosten nach: NOR.
Von Händler/Antiquariat, BuySomeBooks.
R Oldenbourg Verlag GmbH. Paperback. New. Paperback. 238 pages. Dimensions: 9.4in. x 6.7in. x 0.7in.This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy. This item ships from multiple locations. Your book may arrive from Roseburg,OR, La Vergne,TN.
Von Händler/Antiquariat, BuySomeBooks.
R Oldenbourg Verlag GmbH. Paperback. New. Paperback. 238 pages. Dimensions: 9.4in. x 6.7in. x 0.7in.This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy. This item ships from multiple locations. Your book may arrive from Roseburg,OR, La Vergne,TN.
2
Client-Honeypots: Exploring Malicious Websites
DE US
ISBN: 9783486705263 bzw. 3486705261, in Deutsch, Oldenbourg, München, Deutschland, gebraucht.
Lieferung aus: Deutschland, 3.
This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently, This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy.
This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently, This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy.
3
Client-Honeypots, Exploring Malicious Websites (2011)
DE PB NW
ISBN: 9783486705263 bzw. 3486705261, in Deutsch, Walter De Gruyter & Co, Taschenbuch, neu.
Lieferung aus: Niederlande, 5-7 werkdagen.
bol.com.
This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy.Taal: Engels;Afmetingen: 13x240x170 mm;Gewicht: 456,00 gram;Geschikt voor: 22 jaar en ouder;Verschijningsdatum: januari 2011;Druk: 1;ISBN10: 3486705261;ISBN13: 9783486705263; Engelstalig | Paperback | 2011.
bol.com.
This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy.Taal: Engels;Afmetingen: 13x240x170 mm;Gewicht: 456,00 gram;Geschikt voor: 22 jaar en ouder;Verschijningsdatum: januari 2011;Druk: 1;ISBN10: 3486705261;ISBN13: 9783486705263; Engelstalig | Paperback | 2011.
4
Client-Honeypots: Exploring Malicious Websites (2011)
EN PB US
ISBN: 9783486705263 bzw. 3486705261, in Englisch, 233 Seiten, De Gruyter Oldenbourg, Taschenbuch, gebraucht.
Fra: EUR 61,48 (5 Tilbud)
Brukt fra: EUR 15,98 (4 Tilbud)
Vis mer 9 Tilbud på Amazon.de (Int.)
Lieferung aus: Deutschland, Versandfertig in 1 - 2 Werktagen.
Von Händler/Antiquariat, MEDIMOPS.
Client-Honeypots This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy. Taschenbuch, Etikett: De Gruyter Oldenbourg, De Gruyter Oldenbourg, Varegrupper: Book, Publisert: 2011-01-01, Utgivelsesdato: 2010-12-17, Studio: De Gruyter Oldenbourg, Salg rangering: 1638668.
Von Händler/Antiquariat, MEDIMOPS.
Client-Honeypots This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy. Taschenbuch, Etikett: De Gruyter Oldenbourg, De Gruyter Oldenbourg, Varegrupper: Book, Publisert: 2011-01-01, Utgivelsesdato: 2010-12-17, Studio: De Gruyter Oldenbourg, Salg rangering: 1638668.
Lade…