Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200985Ia 4500 
001    162131556 
003    OCoLC 
005    20220502213021.0 
006    m     o  d         
007    cr cn||||||||| 
008    070802s2007    maua    o     001 0 eng d 
015    GBA734026|2bnb 
019    85821827|a171131710|a271611373|a488133729|a505126864
       |a647645234|a824140481|a1020517194|a1103267683|a1129378208
       |a1162442864 
020    9781597491358 
020    1597491357 
020    0080500234 
020    9780080500232 
020    9781429456593 
020    1429456590 
020    1281060232 
020    9781281060235 
020    9786611060237 
020    6611060235 
029 1  AU@|b000043031381 
029 1  AU@|b000053044657 
029 1  CHBIS|b005829027 
029 1  CHNEW|b001006093 
029 1  CHVBK|b16847221X 
029 1  DEBBG|bBV041119732 
029 1  DEBBG|bBV042314175 
029 1  DEBBG|bBV043043922 
029 1  DEBSZ|b396676154 
029 1  DEBSZ|b405305885 
029 1  DEBSZ|b422226025 
029 1  DEBSZ|b430383762 
029 1  NZ1|b11778362 
029 1  NZ1|b15121361 
035    (OCoLC)162131556|z(OCoLC)85821827|z(OCoLC)171131710
       |z(OCoLC)271611373|z(OCoLC)488133729|z(OCoLC)505126864
       |z(OCoLC)647645234|z(OCoLC)824140481|z(OCoLC)1020517194
       |z(OCoLC)1103267683|z(OCoLC)1129378208|z(OCoLC)1162442864 
037    138456:138593|bElsevier Science & Technology|nhttp://
       www.sciencedirect.com 
040    OPELS|beng|epn|cOPELS|dOCLCQ|dN$T|dYDXCP|dLVB|dUBY|dIDEBK
       |dE7B|dAU@|dEBLCP|dOCLCO|dDKDLA|dUMI|dDEBSZ|dOCLCQ|dOCLCF
       |dOCLCO|dOCLCQ|dOCLCO|dOCLCQ|dOCLCO|dCOO|dOCLCO|dOCLCQ
       |dOCLCO|dAGLDB|dZ5A|dMERUC|dOCLCQ|dJBG|dOCLCA|dROC|dD6H
       |dUAB|dOCLCQ|dVTS|dCEF|dOCLCQ|dSTF|dLEAUB|dVT2|dOCLCQ|dVLY
       |dAJS|dOCLCQ|dOCLCO|dM8D|dOCLCO 
049    INap 
082 04 005.8 
082 04 005.8|222 
100 1  Schiller, Craig A. 
245 10 Botnets :|bthe killer web app /|cCraig A. Schiller [and 
       others].|h[O'Reilly electronic resource] 
260    Rockland, MA :|bSyngress Pub.,|c©2007. 
300    1 online resource (xv, 464 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
505 0  Botnets: A Call to Action -- Botnets Overview -- 
       Alternative Botnet C & Cs -- Common Botnets -- Botnet 
       Detection: Tools and Techniques -- Ourmon: Overview and 
       Installation -- Ourmon: Anomaly Detection Tools -- IRC and
       Botnets -- Advanced Ourmon Techniques -- Using Sandbox 
       Tools for Botnets -- Intelligence Resources -- Responding 
       to Botnets. 
520    The book begins with real world cases of botnet attacks to
       underscore the need for action. Next the book will explain
       botnet fundamentals using real world examples. These 
       chapters will cover what they are, how they operate, and 
       the environment and technology that makes them possible. 
       The following chapters will analyze botnets for 
       opportunities to detect, track, and remove them. Then the 
       book will describe intelligence gathering efforts and 
       results obtained to date. Public domain tools like OurMon,
       developed by Jim Binkley of Portland State University, 
       will be described in detail along with discussions of 
       other tools and resources that are useful in the fight 
       against Botnets. * This is the first book to explain the 
       newest internet threat - Botnets, zombie armies, bot 
       herders, what is being done, and what you can do to 
       protect your enterprise * Botnets are the most complicated
       and difficult threat the hacker world has unleashed - read
       how to protect yourself. 
546    English. 
588 0  Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition (EZproxy Access) 
650  0 Computer networks|xSecurity measures.|0http://id.loc.gov/
       authorities/subjects/sh94001277 
650  0 Web sites|xSecurity measures. 
650  0 Computer security. 
650  0 Intelligent agents (Computer software)|0http://id.loc.gov/
       authorities/subjects/sh97000493 
650  2 Computer Security 
650  6 Réseaux d'ordinateurs|xSécurité|xMesures. 
650  6 Sites Web|xSécurité|xMesures. 
650  6 Agents intelligents (Logiciels) 
650  6 Sécurité informatique. 
650  7 COMPUTERS|xInternet|xSecurity.|2bisacsh 
650  7 COMPUTERS|xNetworking|xSecurity.|2bisacsh 
650  7 COMPUTERS|xSecurity|xGeneral.|2bisacsh 
650  7 Computer networks|xSecurity measures.|2fast
       |0(OCoLC)fst00872341 
650  7 Computer security.|2fast|0(OCoLC)fst00872484 
650  7 Web sites|xSecurity measures.|2fast|0(OCoLC)fst01173267 
655  0 Electronic books. 
655  4 Electronic books. 
776 08 |iPrint version:|aSchiller, Craig A.|tBotnets.|dRockland, 
       MA : Syngress Pub., ©2007|z1597491357|z9781597491358
       |w(OCoLC)82451884 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781597491358/?ar 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781597491358/?ar&orpq
       &email=̂u 
938    EBL - Ebook Library|bEBLB|nEBL289737 
938    ebrary|bEBRY|nebr10156084 
938    EBSCOhost|bEBSC|n184406 
938    YBP Library Services|bYANK|n2532825 
938    YBP Library Services|bYANK|n2613813 
994    92|bJFN