<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>02410nam a2200313 a 4500</leader>
  <controlfield tag="001">1/44595</controlfield>
  <controlfield tag="008">140620s2002    us            001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">1597490296 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781597490290 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">0080488293 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9780080488295 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="z">1931836205</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="z">9781931836203</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">47549</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">REDDC</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">REDDC</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">NTG</subfield>
   <subfield code="d">WPG</subfield>
   <subfield code="d">EBLCP</subfield>
   <subfield code="d">YDXCP</subfield>
   <subfield code="d">CDN</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">DKDLA</subfield>
   <subfield code="d">ZCU</subfield>
   <subfield code="d">MERUC</subfield>
   <subfield code="d">CCO</subfield>
   <subfield code="d">E7B</subfield>
   <subfield code="d">IDEBK</subfield>
   <subfield code="d">DEBBG</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">N$T</subfield>
   <subfield code="d">OPELS</subfield>
   <subfield code="d">FVL</subfield>
   <subfield code="d">CSU</subfield>
   <subfield code="d">B24X7</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">UMI</subfield>
   <subfield code="d">DEBSZ</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Wyler, Neil R.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Aggressive network self-defense</subfield>
   <subfield code="h">[electronic resource] /</subfield>
   <subfield code="c">Neil R. Wyler.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Rockland, MA :</subfield>
   <subfield code="b">Syngress Pub.,</subfield>
   <subfield code="c">c2005.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xxx, 383 p.) :</subfield>
   <subfield code="b">ill.</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes bibliographical references and index.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">Are you tired of feeling vulnerable to the latest security vulnerabilities? Are you fed up with vendors who take too long to release security patches, while criminals waste no time in exploiting those very same holes? Do you want to know who, exactly, is really trying to hack your network? Do you think EVERYONE should be responsible for securing their owns systems so they can't be used to attack yours? Do you think you have the right to defend yourself, your network, and ultimately your business against aggressors and adversaries? If so, Aggressive Network Self-Defense is the book for you. Le.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Introduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Internet</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">EBOOKS</subfield>
   <subfield code="e">20140620</subfield>
   <subfield code="p">00b47549</subfield>
   <subfield code="q">00b47549</subfield>
   <subfield code="t">ONLINE</subfield>
   <subfield code="y">0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="3">ScienceDirect</subfield>
   <subfield code="u">http://www.sciencedirect.com/science/book/9781931836203</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/47549_0080488293.jpg</subfield>
   <subfield code="z">(electronic bk.)</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/47549_9780080488295.jpg</subfield>
   <subfield code="z">(electronic bk.)</subfield>
  </datafield>
 </record>
</collection>
