Predicting malicious behavior: tools and techniques for ensuring global security
Main Author: | |
---|---|
Format: | Print Book |
Language: | English |
Published: |
Indianapolis, Ind.
Wiley
2012
|
In: | Year: 2012 |
Online Access: |
Cover Table of Contents |
Availability in Tübingen: | Present in Tübingen. UB: KB 20 A 6253 |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: | |
Related Items: | Online-Ausg.:
1658088263 |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 684689936 | ||
003 | DE-627 | ||
005 | 20240421212016.0 | ||
007 | tu | ||
008 | 120202s2012 xxu||||| 00| ||eng c | ||
016 | 7 | |a 016009803 |2 UK | |
020 | |a 9781118166130 |c pbk. : USD 54.99 |9 978-1-118-16613-0 | ||
020 | |a 1118166132 |c (pbk.) £33.99 |9 1-118-16613-2 | ||
035 | |a (DE-627)684689936 | ||
035 | |a (DE-576)357775953 | ||
035 | |a (DE-599)BSZ357775953 | ||
035 | |a (OCoLC)815883852 | ||
035 | |a (OCoLC)815883852 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
044 | |c XD-US | ||
082 | 0 | |a 364.3 |q BSZ | |
084 | |a 2,1 |2 ssgn | ||
084 | |a CW 8100 |q BVB |2 rvk |0 (DE-625)rvk/19208: | ||
084 | |a ST 277 |q OBV |2 rvk |0 (DE-625)rvk/143643: | ||
084 | |a ST 670 |q OBV |2 rvk |0 (DE-625)rvk/143689: | ||
084 | |a 89.58 |2 bkl | ||
100 | 1 | |a Jackson, Gary M. |4 aut | |
245 | 1 | 0 | |a Predicting malicious behavior |b tools and techniques for ensuring global security |c Gary M. Jackson |
246 | 3 | 0 | |a behaviour |
246 | 3 | 3 | |a Malicious |
264 | 1 | |a Indianapolis, Ind. |b Wiley |c 2012 | |
300 | |a XXXVII, 513 S. |b Ill., graph. Darst. |e 1 DVD-ROM (12 cm) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a DVD-Beil.: Instructional videos showing how the automated behaviour analysis (AuBA) tools work and how you can use them. The DVD for the book is divided into two sections: details in the use of the (AuBA) tools, ThemeMate and AutoAnalyzer; demonstrations of CheckMate and InMate, two cyber-based, network protection tools that were constructed using AuBA | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |f SSG |x XA-DE-BW |2 pdager |5 DE-21 | |
583 | 1 | |a Archivierung prüfen |c 20240324 |f DE-4165 |z 2 |2 pdager | |
653 | |a Criminal behavior |a Prevention | ||
653 | |a Criminal behavior, Prediction of | ||
653 | |a Psychology | ||
653 | |a Security, International | ||
689 | 0 | 0 | |d s |0 (DE-588)4059534-1 |0 (DE-627)106143212 |0 (DE-576)209131136 |a Terrorismus |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4157237-3 |0 (DE-627)105502421 |0 (DE-576)209832878 |a Gewalttätigkeit |2 gnd |
689 | 0 | 2 | |d s |0 (DE-588)4033178-7 |0 (DE-627)10458503X |0 (DE-576)209000511 |a Kriminalität |2 gnd |
689 | 0 | 3 | |d s |0 (DE-588)4047390-9 |0 (DE-627)106194712 |0 (DE-576)209073446 |a Prognose |2 gnd |
689 | 0 | 4 | |d s |0 (DE-588)4164679-4 |0 (DE-627)104330716 |0 (DE-576)209890088 |a Kollektive Sicherheit |2 gnd |
689 | 0 | 5 | |d s |0 (DE-588)4070085-9 |0 (DE-627)104131403 |0 (DE-576)209179252 |a Rechnernetz |2 gnd |
689 | 0 | 6 | |d s |0 (DE-588)4054790-5 |0 (DE-627)106161075 |0 (DE-576)209110589 |a Sicherheit |2 gnd |
689 | 0 | 7 | |d s |0 (DE-588)4011152-0 |0 (DE-627)106354140 |0 (DE-576)208892052 |a Datenverarbeitung |2 gnd |
689 | 0 | 8 | |d s |0 (DE-588)4051131-5 |0 (DE-627)10617844X |0 (DE-576)209091541 |a Sabotage |2 gnd |
689 | 0 | |5 (DE-627) | |
776 | 1 | |z 9781118226254 |c (ebk) | |
776 | 1 | |z 9781118239568 |c (ebk.) | |
776 | 1 | |z 9781118264188 |c (ebk.) | |
776 | 0 | 8 | |i Online-Ausg. |a Jackson, Gary M |t Predicting Malicious Behavior |b 1st ed. |d Hoboken : John Wiley & Sons, Incorporated, 2012 |h 1 online resource (554 pages) |w (DE-627)1658088263 |w (DE-576)515380113 |z 9781118226254 |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz357775953cov.jpg |m V:DE-576 |m X:wiley |q image/jpeg |v 20130305115612 |3 Cover |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz357775953inh.htm |m V:DE-576;B:DE-Frei85 |q application/pdf |v 20130315091539 |3 Inhaltsverzeichnis |
935 | |i Blocktest | ||
936 | r | v | |a CW 8100 |b Kriminologie, Kriminalistik (soweit für Psychologie von Interesse) |k Psychologie |k Angewandte Psychologie |k Andere Gebiete der angewandten Psychologie |k Kriminologie, Kriminalistik (soweit für Psychologie von Interesse) |0 (DE-627)127149616X |0 (DE-625)rvk/19208: |0 (DE-576)20149616X |
936 | r | v | |a ST 277 |b Sonstiges zur Sicherheit in der Datenverarbeitung |k Informatik |k Monografien |k Software und -entwicklung |k Sonstiges zur Sicherheit in der Datenverarbeitung |0 (DE-627)1271118971 |0 (DE-625)rvk/143643: |0 (DE-576)201118971 |
936 | r | v | |a ST 670 |b Pädagogik, Psychologie |k Informatik |k Monografien |k Einzelne Anwendungen der Datenverarbeitung |k Datenverarbeitung in Anwendungsgebieten |k Pädagogik, Psychologie |0 (DE-627)1271610310 |0 (DE-625)rvk/143689: |0 (DE-576)201610310 |
936 | b | k | |a 89.58 |j Politische Gewalt |0 (DE-627)106416960 |
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 318882193X | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 684689936 | ||
LOK | |0 005 20131113162758 | ||
LOK | |0 008 130430||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |c KB 20 A 6253 |9 00 | ||
LOK | |0 935 |a krim | ||
LOK | |0 936ln |a k4.7.5 | ||
LOK | |0 938 |a 1311 |f 34 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3188822014 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 684689936 | ||
LOK | |0 005 20130215121009 | ||
LOK | |0 008 120130||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 938 |k p | ||
ORI | |a SA-MARC-krimdoka001.raw | ||
SIG | |a UB: KB 20 A 6253 |