|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
lb323277 |
003 |
CoU-L |
005 |
20220526042837.0 |
008 |
080307t20092009fluab b 001 0 eng |
010 |
|
|
|a 2008010309
|
020 |
|
|
|a 9781420069037 (alk. paper)
|
020 |
|
|
|a 1420069039 (alk. paper)
|
035 |
|
|
|a (OCoLC)213223394
|
035 |
|
|
|a .b3232773
|b lstb
|c -
|
040 |
|
|
|a DLC
|c DLC
|d BAKER
|d UKM
|d YDXCP
|d BTCTA
|d NLGGC
|d C#P
|d BWX
|d CDX
|d UtOrBLW
|
049 |
|
|
|a UCXA
|
050 |
0 |
0 |
|a HV6773
|b .D86 2009
|
082 |
0 |
0 |
|a 364.16/8
|2 22
|
100 |
1 |
|
|a Dunham, Ken.
|
245 |
1 |
0 |
|a Malicious bots :
|b an inside look into the cyber-criminal underground of the Internet /
|c Ken Dunham, Jim Melnick.
|
246 |
3 |
|
|a Malicious bots :
|b an inside look into the cyber criminal underground of the Internet.
|
264 |
|
1 |
|a Boca Raton :
|b CRC Press,
|c [2009]
|
264 |
|
4 |
|c ©2009.
|
300 |
|
|
|a xiv, 153 pages :
|b illustrations, maps ;
|c 25 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent.
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia.
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier.
|
500 |
|
|
|a "An Auerbach book."
|
504 |
|
|
|a Includes bibliographical references (pages 135-143) and index.
|
505 |
0 |
|
|a Introduction to bots -- Thr34t security krew and the TK worm -- Demonstration : how a hacker launches a botnet attack -- Introduction to the use of botnets in criminal activity -- Botnets and the ecrime cycle : the iSIGHT partners' approach -- Technical introduction to bots -- Mitigation -- Concluding thoughts.
|
650 |
|
0 |
|a Computer crimes
|v Case studies.
|
650 |
|
0 |
|a Internet.
|
700 |
1 |
|
|a Melnick, Jim.
|
902 |
|
|
|a 220825
|
999 |
|
|
|b 1
|c 081107
|d m
|e a
|f -
|g 0
|
994 |
|
|
|a lstb
|
945 |
|
|
|l lstb
|
999 |
f |
f |
|i 40e2b2d1-35d3-5929-87c0-cea7f27012f2
|s ec07b577-3183-51fc-8cd9-a14f4d43116b
|
952 |
f |
f |
|p Can circulate
|a University of Colorado Boulder
|b Law Campus
|c Law
|d Law Library - Stacks basement
|e HV6773 .D86 2009
|h Library of Congress classification
|i book
|m U182004382886
|n 1
|