MARC details
| 000 -LEADER |
| fixed length control field |
04852cam a22004337i 4500 |
| 001 - CONTROL NUMBER |
| control field |
16185955 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20210418120510.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
100414s2010 ne a b 001 0 eng d |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2010278269 |
| 015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
| National bibliography number |
GBB004890 |
| Source |
bnb |
| 016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
| Record control number |
015462710 |
| Source |
Uk |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781597495516 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1597495514 (pbk.) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)ocn460059015 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
UKM |
| Transcribing agency |
UKM |
| Modifying agency |
YDXCP |
| -- |
C#P |
| -- |
DLC |
| Description conventions |
rda |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
lccopycat |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.76.C68 |
| Item number |
S48 2010 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Item number |
S |
| Edition number |
22 |
| 245 00 - TITLE STATEMENT |
| Title |
Seven deadliest Microsoft attacks / |
| Statement of responsibility, etc |
Rob Kraus ... [et al.] ; technical editor, Chris Griffin. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Amsterdam ; |
| -- |
Boston : |
| Name of publisher, distributor, etc |
Syngress/Elsevier, |
| Date of publication, distribution, etc |
c2010. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xvi, 149 pages. : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| 490 1# - SERIES STATEMENT |
| Series statement |
Syngress seven deadliest attacks series |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Acknowledgments<br/><br/>About the Authors<br/><br/>Introduction<br/><br/>Chapter 1 Windows Operating System – Password Attacks<br/><br/>Windows Passwords Overview<br/><br/>Security Accounts Manager<br/><br/>System Key (SYSKEY)<br/><br/>LAN Manager Hash<br/><br/>NT Hash<br/><br/>LSA Secrets<br/><br/>Password and Lockout Policies<br/><br/>How Windows Password Attacks Work<br/><br/>Dangers with Windows Password Attacks<br/><br/>Scenario 1: Obtaining Password Hashes<br/><br/>Scenario 2: Pass the Hash<br/><br/>Scenario 3: Timed Attacks to Circumvent Lockouts<br/><br/>Scenario 4: LSA Secrets<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Acknowledgments<br/><br/>About the Authors<br/><br/>Introduction<br/><br/>Chapter 1 Windows Operating System – Password Attacks<br/><br/>Windows Passwords Overview<br/><br/>Security Accounts Manager<br/><br/>System Key (SYSKEY)<br/><br/>LAN Manager Hash<br/><br/>NT Hash<br/><br/>LSA Secrets<br/><br/>Password and Lockout Policies<br/><br/>How Windows Password Attacks Work<br/><br/>Dangers with Windows Password Attacks<br/><br/>Scenario 1: Obtaining Password Hashes<br/><br/>Scenario 2: Pass the Hash<br/><br/>Scenario 3: Timed Attacks to Circumvent Lockouts<br/><br/>Scenario 4: LSA Secrets<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Defenses against Stored Procedure Attacks<br/><br/>First Defensive Layer: Eliminating First-Layer Attacks<br/><br/>Second Defensive Layer: Reduce the First-Layer Attack Surface<br/><br/>Third Defensive Layer: Reducing Second-Layer Attacks<br/><br/>Fourth Defensive Layer: Logging, Monitoring, and Alerting<br/><br/>Identifying Vital Attack Events<br/><br/>Fifth Defensive Layer: Limiting the Impacts of Attacks<br/><br/>Summary<br/><br/>Endnotes<br/><br/>Chapter 4 Exchange Server – Mail Service Attacks<br/><br/>How Mail Service Attacks Work<br/><br/>Mail Flow Architecture<br/><br/>Attack Points<br/><br/>Dangers Associated with Mail Service Attacks<br/><br/>Scenario 1: Directory Harvest Attacks<br/><br/>Scenario 2: SMTP Auth Attacks<br/><br/>Scenario 3: Mail Relay Attacks<br/><br/>The Future of Mail Service Attacks<br/><br/>Defenses against Mail Service Attacks<br/><br/>Defense in the Perimeter Network<br/><br/>Defense on the Internal Network<br/><br/>Supporting Services<br/><br/>Summary<br/><br/>Chapter 5 Office – Macros and ActiveX<br/><br/>Macro and Client-Side Attack Anatomy<br/><br/>Macro Attacks<br/><br/>ActiveX Attacks<br/><br/>Dangers Associated with Macros and ActiveX<br/><br/>Scenario 1: Metasploit Reverse TCP Connection<br/><br/>Scenario 2: ActiveX Attack via Malicious Website<br/><br/>Future of Macro and ActiveX Attacks<br/><br/>Macro and ActiveX Defenses<br/><br/>Deploy Network Edge Strategies<br/><br/>Using Antivirus and Antimalware<br/><br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Update Frequently<br/><br/>Using Office Security Settings<br/><br/>Working Smart<br/><br/>Summary<br/><br/>Endnote<br/><br/>Chapter 6 Internet Information Services – Web Service Attacks<br/><br/>Microsoft IIS Overview<br/><br/>File Transfer Protocol Publishing Service<br/><br/>WebDAV Extension<br/><br/>ISAPI<br/><br/>How IIS Attacks Work<br/><br/>Dangers with IIS Attacks<br/><br/>Scenario 1: Dangerous HTTP Methods<br/><br/>Scenario 2: FTP Anonymous Access<br/><br/>Scenario 3: Directory Browsing<br/><br/>Future of IIS Attacks<br/><br/>Defenses Against IIS Attacks<br/><br/>Disable Unused Services<br/><br/>Default Configurations<br/><br/>Account Security<br/><br/>Patch Management<br/><br/>Logging<br/><br/>Segregate IIS<br/><br/>Penetration Testing<br/><br/>URLScan<br/><br/>IIS Lockdown<br/><br/>Summary<br/><br/>Chapter 7 SharePoint – Multi-tier Attacks<br/><br/>How Multi-tier Attacks Work<br/><br/>Multi-tier Attack Anatomy<br/><br/>Dangers with Multi-tier Attacks<br/><br/>Scenario 1: Leveraging Operating System Vulnerabilities<br/><br/>Scenario 2: Indirect Attacks<br/><br/>How Multi-tier Attacks Will Be Used in the Future<br/><br/>Defenses against Multi-tier Attacks<br/><br/>First Defensive Layer: Failure to Plan = Plan to Fail<br/><br/>Second Defensive Layer: Leave No Hole Unpatched<br/><br/>Third Defensive Layer: Form the Protective Circle<br/><br/>Summary<br/><br/>Endnotes<br/><br/>Index<br/><br/> |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer viruses. |
| 9 (RLIN) |
426 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Kraus, Rob. |
| 830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
Syngress seven deadliest attacks series. |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
copycat |
| d |
2 |
| e |
ncip |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |