Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Seven deadliest Microsoft attacks / (Record no. 10063)

MARC details
000 -LEADER
fixed length control field 04852cam a22004337i 4500
001 - CONTROL NUMBER
control field 16185955
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210418120510.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100414s2010 ne a b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010278269
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB004890
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 015462710
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597495516 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1597495514 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn460059015
040 ## - CATALOGING SOURCE
Original cataloging agency UKM
Transcribing agency UKM
Modifying agency YDXCP
-- C#P
-- DLC
Description conventions rda
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.76.C68
Item number S48 2010
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number S
Edition number 22
245 00 - TITLE STATEMENT
Title Seven deadliest Microsoft attacks /
Statement of responsibility, etc Rob Kraus ... [et al.] ; technical editor, Chris Griffin.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Amsterdam ;
-- Boston :
Name of publisher, distributor, etc Syngress/Elsevier,
Date of publication, distribution, etc c2010.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 149 pages. :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
490 1# - SERIES STATEMENT
Series statement Syngress seven deadliest attacks series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Acknowledgments<br/><br/>About the Authors<br/><br/>Introduction<br/><br/>Chapter 1 Windows Operating System – Password Attacks<br/><br/>Windows Passwords Overview<br/><br/>Security Accounts Manager<br/><br/>System Key (SYSKEY)<br/><br/>LAN Manager Hash<br/><br/>NT Hash<br/><br/>LSA Secrets<br/><br/>Password and Lockout Policies<br/><br/>How Windows Password Attacks Work<br/><br/>Dangers with Windows Password Attacks<br/><br/>Scenario 1: Obtaining Password Hashes<br/><br/>Scenario 2: Pass the Hash<br/><br/>Scenario 3: Timed Attacks to Circumvent Lockouts<br/><br/>Scenario 4: LSA Secrets<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Acknowledgments<br/><br/>About the Authors<br/><br/>Introduction<br/><br/>Chapter 1 Windows Operating System – Password Attacks<br/><br/>Windows Passwords Overview<br/><br/>Security Accounts Manager<br/><br/>System Key (SYSKEY)<br/><br/>LAN Manager Hash<br/><br/>NT Hash<br/><br/>LSA Secrets<br/><br/>Password and Lockout Policies<br/><br/>How Windows Password Attacks Work<br/><br/>Dangers with Windows Password Attacks<br/><br/>Scenario 1: Obtaining Password Hashes<br/><br/>Scenario 2: Pass the Hash<br/><br/>Scenario 3: Timed Attacks to Circumvent Lockouts<br/><br/>Scenario 4: LSA Secrets<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Defenses against Stored Procedure Attacks<br/><br/>First Defensive Layer: Eliminating First-Layer Attacks<br/><br/>Second Defensive Layer: Reduce the First-Layer Attack Surface<br/><br/>Third Defensive Layer: Reducing Second-Layer Attacks<br/><br/>Fourth Defensive Layer: Logging, Monitoring, and Alerting<br/><br/>Identifying Vital Attack Events<br/><br/>Fifth Defensive Layer: Limiting the Impacts of Attacks<br/><br/>Summary<br/><br/>Endnotes<br/><br/>Chapter 4 Exchange Server – Mail Service Attacks<br/><br/>How Mail Service Attacks Work<br/><br/>Mail Flow Architecture<br/><br/>Attack Points<br/><br/>Dangers Associated with Mail Service Attacks<br/><br/>Scenario 1: Directory Harvest Attacks<br/><br/>Scenario 2: SMTP Auth Attacks<br/><br/>Scenario 3: Mail Relay Attacks<br/><br/>The Future of Mail Service Attacks<br/><br/>Defenses against Mail Service Attacks<br/><br/>Defense in the Perimeter Network<br/><br/>Defense on the Internal Network<br/><br/>Supporting Services<br/><br/>Summary<br/><br/>Chapter 5 Office – Macros and ActiveX<br/><br/>Macro and Client-Side Attack Anatomy<br/><br/>Macro Attacks<br/><br/>ActiveX Attacks<br/><br/>Dangers Associated with Macros and ActiveX<br/><br/>Scenario 1: Metasploit Reverse TCP Connection<br/><br/>Scenario 2: ActiveX Attack via Malicious Website<br/><br/>Future of Macro and ActiveX Attacks<br/><br/>Macro and ActiveX Defenses<br/><br/>Deploy Network Edge Strategies<br/><br/>Using Antivirus and Antimalware<br/><br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Update Frequently<br/><br/>Using Office Security Settings<br/><br/>Working Smart<br/><br/>Summary<br/><br/>Endnote<br/><br/>Chapter 6 Internet Information Services – Web Service Attacks<br/><br/>Microsoft IIS Overview<br/><br/>File Transfer Protocol Publishing Service<br/><br/>WebDAV Extension<br/><br/>ISAPI<br/><br/>How IIS Attacks Work<br/><br/>Dangers with IIS Attacks<br/><br/>Scenario 1: Dangerous HTTP Methods<br/><br/>Scenario 2: FTP Anonymous Access<br/><br/>Scenario 3: Directory Browsing<br/><br/>Future of IIS Attacks<br/><br/>Defenses Against IIS Attacks<br/><br/>Disable Unused Services<br/><br/>Default Configurations<br/><br/>Account Security<br/><br/>Patch Management<br/><br/>Logging<br/><br/>Segregate IIS<br/><br/>Penetration Testing<br/><br/>URLScan<br/><br/>IIS Lockdown<br/><br/>Summary<br/><br/>Chapter 7 SharePoint – Multi-tier Attacks<br/><br/>How Multi-tier Attacks Work<br/><br/>Multi-tier Attack Anatomy<br/><br/>Dangers with Multi-tier Attacks<br/><br/>Scenario 1: Leveraging Operating System Vulnerabilities<br/><br/>Scenario 2: Indirect Attacks<br/><br/>How Multi-tier Attacks Will Be Used in the Future<br/><br/>Defenses against Multi-tier Attacks<br/><br/>First Defensive Layer: Failure to Plan = Plan to Fail<br/><br/>Second Defensive Layer: Leave No Hole Unpatched<br/><br/>Third Defensive Layer: Form the Protective Circle<br/><br/>Summary<br/><br/>Endnotes<br/><br/>Index<br/><br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer viruses.
9 (RLIN) 426
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kraus, Rob.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Syngress seven deadliest attacks series.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Acquisition method Total Checkouts Full call number Barcode Date last seen Date checked out Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( General ) Main library Main library A2 22/11/2015 MERIC 198.00 Donation 1 005.8 S 00013054 19/02/2025 31/12/2018 22/11/2015 Books