| 000 | 02433nam a2200337 i 4500 | ||
|---|---|---|---|
| 003 | CSPC | ||
| 005 | 20250917152856.0 | ||
| 008 | 250917s2019 b 000 0 eng d | ||
| 020 | _a9781733003933 | ||
| 040 |
_cCSPC _aCSPC _beng _erda |
||
| 050 | 0 | 4 |
_aQA76.9.A25 _bD8 2019 |
| 082 | 0 | 4 |
_a005.8 _bD85c |
| 100 | 1 |
_aDu, Wenliang, _eauthor. |
|
| 245 | 1 | 0 |
_aComputer & internet security : _ba hands-on approach / _cWenliang Du. |
| 246 | 0 | 3 |
_aComputer and internet security : _ba hands-on approach. |
| 250 | _aSecond edition. | ||
| 264 | 1 |
_a[Place of Publication not identified] : _b[Name of Publisher not identified], _c2019. |
|
| 300 |
_axxx, 657 pages ; _c24 cm. |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 504 | _aIncludes bibliographical references. | ||
| 505 | 0 | _aI. Software security -- Set-UID programs -- Environment variables and attacks -- Shellshock attack -- Buffer overflow attack -- Return-to-libc attack and ROP -- Format string vulnerability -- Race condition vulnerability -- Dirty COW -- Reverse shell -- II. Web security -- Cross site request forgery -- Cross-site scripting attack -- SQL injection attack -- III. Hardware security -- Meltdown attack -- Spectre attack -- IV. Network security -- Packet sniffling and spoofing -- Attacks on the TCP protocol -- Firewall -- Domain name system (DNS) and attacks -- Virtual private network -- The heartbleed bug and attack -- V. Cryptography -- Secret-key encryption -- One-way hash function -- Public key cryptography -- Public key infrastructure -- Transport layer security -- Bitcoin and blockchain. | |
| 520 | _a"Readers can learn how computer attacks really work, understand their fundamental causes and defense, and try these attacks themselves on the virtual machines provided by the author. The book is based on the SEED labs developed by the author. These labs are hands-on experiments and exercises that have been used by over 1000 universities, colleges, and high schools worldwide. SEED labs are free for educational use." | ||
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aInternet _xSecurity measures. |
|
| 650 | 0 | _aUser-centered system design. | |
| 942 |
_2ddc _n0 _cBK _h005.8 _iD85c _kGRD _m2019 |
||
| 999 |
_c30524 _d30524 |
||