|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1131785410 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr mn||||||||| |
008 |
200225t20202020enka ob 000 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d N$T
|d OCLCF
|d UKMGB
|d OSU
|d UKAHL
|d EBLCP
|d OCLCQ
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBC038223
|2 bnb
|
015 |
|
|
|a GBC032524
|2 bnb
|
016 |
7 |
|
|a 019649762
|2 Uk
|
019 |
|
|
|a 1132423473
|
020 |
|
|
|a 9781527544086
|q (electronic bk.)
|
020 |
|
|
|a 1527544087
|q (electronic bk.)
|
020 |
|
|
|z 9781527541436
|q (hardcover)
|
020 |
|
|
|z 1527541436
|q (hardcover)
|
029 |
1 |
|
|a UKMGB
|b 019649762
|
035 |
|
|
|a (OCoLC)1131785410
|z (OCoLC)1132423473
|
037 |
|
|
|a 9781527544086
|b Cambridge Scholars Publishing
|
050 |
|
4 |
|a QA76.9.A25
|b S45 2020
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Selvaraj, Rajalakshmi,
|e author.
|
245 |
1 |
0 |
|a Ensuring network security through the use of the honeypot technique /
|c by Rajalakshmi Selvaraj and Kuthadi Venu Madhav
|
264 |
|
1 |
|a Newcastle upon Tyne, UK :
|b Cambridge Scholars Publishing,
|c 2020
|
264 |
|
4 |
|c ©2020
|
300 |
|
|
|a 1 online resource (vii, 153 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references
|
505 |
0 |
|
|a Introduction -- Literature review -- Motivation -- Honeypot technique for intrusion detection -- DDoS detection based on the ant technique using roaming virtual honeypots -- Enhanced intrusion detection system performance using Firecol Protection Services based honeypot system -- EIPDS: an effective technique to secure the network from intrusion -- An effective ODAIDS-HPS approach to preventing, detecting and responding to DDoS attacks -- Conclusions and future work
|
588 |
0 |
|
|a Print version record
|
520 |
|
|
|a In modern technology networks, security plays an important role in safeguarding data. Detecting the threats posed by hackers, and capturing the data about such attacks are known as the virtual honeypot. This book details the process, highlighting how to confuse the attackers and to direct them onto the wrong path.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Hacking
|x Prevention.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
700 |
1 |
|
|a Madhav, Kuthadi Venu,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Selvaraj, Rajalakshmi.
|t Ensuring network security through the use of the honeypot technique.
|d Newcastle upon Tyne, UK : Cambridge Scholars Publishing, 2020
|z 9781527541436
|w (OCoLC)1125997016
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2329693
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37104683
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5994500
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2329693
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301009763
|
994 |
|
|
|a 92
|b IZTAP
|