Botnets (Record no. 57594)

000 -LEADER
fixed length control field 03596nam a22005655i 4500
001 - CONTROL NUMBER
control field 978-1-4471-5216-3
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112224.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130703s2013 xxk| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781447152163
-- 978-1-4471-5216-3
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Tiirmaa-Klaar, Heli.
245 10 - TITLE STATEMENT
Title Botnets
300 ## - PHYSICAL DESCRIPTION
Number of Pages VIII, 97 p. 5 illus.
490 1# - SERIES STATEMENT
Series statement SpringerBriefs in Cybersecurity,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Foreword -- Botnets, Cybercrime and National Security -- Botnets: How to Fight the Ever-growing Threat on a Technical Level.
520 ## - SUMMARY, ETC.
Summary, etc Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary commands on the infected machines makes botnets a general-purpose tool to perform malicious cyber-activities. Botnets provides a comprehensive analysis of the topic, and comprises both technical and non-technical sections written by leading cybersecurity experts. The non-technical section addresses how botnet infrastructure could be exploited for national security and cybercrime purposes. It approaches the subject as a public policy issue and analyzes the phenomenon of botnets from national security, law enforcement and regulatory policy perspectives, and makes recommendations for policy-makers on different public policies, highlighting the need for international response mechanisms. The technical section provides insight into current botnet techniques and discusses state-of-the-art countermeasures to combat the botnet threat in detail. It includes new detection methods as well as different approaches to actively compromise running botnets.
700 1# - AUTHOR 2
Author 2 Gassen, Jan.
700 1# - AUTHOR 2
Author 2 Gerhards-Padilla, Elmar.
700 1# - AUTHOR 2
Author 2 Martini, Peter.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4471-5216-3
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- London :
-- Springer London :
-- Imprint: Springer,
-- 2013.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer organization.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer communication systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computers.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Systems Organization and Communication Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information Systems and Communication Service.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2193-973X
912 ## -
-- ZDB-2-SCS

No items available.