MARC details
000 -LEADER |
fixed length control field |
03322nam a22005895i 4500 |
001 - CONTROL NUMBER |
control field |
978-0-387-68768-1 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20170628033328.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100301s2008 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780387687681 |
-- |
978-0-387-68768-1 |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1007/978-0-387-68768-1 |
Source of number or code |
doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UTN |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
COM053000 |
Source |
bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Lee, Wenke. |
Relator term |
editor. |
245 10 - TITLE STATEMENT |
Title |
Botnet Detection |
Medium |
[electronic resource] : |
Remainder of title |
Countering the Largest Security Threat / |
Statement of responsibility, etc |
edited by Wenke Lee, Cliff Wang, David Dagon. |
264 #1 - |
-- |
Boston, MA : |
-- |
Springer US, |
-- |
2008. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XII, 168 p. |
Other physical details |
online resource. |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
computer |
-- |
c |
-- |
rdamedia |
338 ## - |
-- |
online resource |
-- |
cr |
-- |
rdacarrier |
347 ## - |
-- |
text file |
-- |
PDF |
-- |
rda |
490 1# - SERIES STATEMENT |
Series statement |
Advances in Information Security, |
International Standard Serial Number |
1568-2633 ; |
Volume number/sequential designation |
36 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Botnet Detection Based on Network Behavior -- Honeynet-based Botnet Scan Traffic Analysis -- Characterizing Bots’ Remote Control Behavior -- Automatically Identifying Trigger-based Behavior in Malware -- Towards Sound Detection of Virtual Machines -- Botnets and Proactive System Defense -- Detecting Botnet Membership with DNSBL Counterintelligence -- A Taxonomy of Botnet Structures. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based on the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets. It provides botnet detection techniques and response strategies, as well as the latest results from leading academic, industry and government researchers. Botnet Detection: Countering the Largest Security Threat is intended for researchers and practitioners in industry. This book is also appropriate as a secondary text or reference book for advanced-level students in computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer network architectures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer Communication Networks. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data structures (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information systems. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer Science. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data Encryption. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information Systems Applications (incl.Internet). |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data Structures, Cryptology and Information Theory. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer Systems Organization and Communication Networks. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Wang, Cliff. |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Dagon, David. |
Relator term |
editor. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9780387687667 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Advances in Information Security, |
-- |
1568-2633 ; |
Volume number/sequential designation |
36 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a> |
912 ## - |
-- |
ZDB-2-SCS |