Cargando…

Honeypots and routers : collecting internet attacks /

Detalles Bibliográficos
Autores principales: Mohammed, Mohssen, 1982- (Autor), Rehman, Habib-ur (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : Auerbach, 2016.
Edición:1st.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000001i 4500
001 OR_on1125076529
003 OCoLC
005 20231017213018.0
006 m d
007 cr |||||||||||
008 151207s2016 flua o 000 0 eng d
040 |a UKMGB  |b eng  |e rda  |e pn  |c UKMGB  |d OCLCO  |d OCLCF  |d OCLCO 
015 |a GBB5H8066  |2 bnb 
016 7 |a 017656344  |2 Uk 
020 |a 9781498702201  |q (PDF ebook) : 
020 |a 1498702201 
020 |z 9781498702195 (hbk.) 
029 0 |a UKMGB  |b 017656344 
029 1 |a AU@  |b 000060010205 
035 |a (OCoLC)1125076529 
037 |a TANDF_381823  |b Ingram Content Group 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Mohammed, Mohssen,  |d 1982-  |e author. 
245 1 0 |a Honeypots and routers :  |b collecting internet attacks /  |c Mohssen Mohammed and Habib-ur Rehman. 
250 |a 1st. 
264 1 |a Boca Raton :  |b Auerbach,  |c 2016. 
300 |a 1 online resource :  |b illustrations (black and white). 
336 |a text  |2 rdacontent 
336 |a still image  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
500 |a <P><STRONG>Computer Networks<BR></STRONG>Devices<BR>Medium<BR>Network Topology<BR>Network Protocols and Standards<BR>Common Network Protocols<BR>References<BR><BR><B>Information System Security<BR></B>CIA Triad<BR>Parkerian Hexad<BR>Model for Information Assurance <BR>Reference Model of Information Assurance and Security<BR>Fundamentals of Hacking<BR>References<BR><BR><B>Intrusions and Vulnerabilities<BR></B>Network Vulnerability List<BR>Operating System Vulnerability List<BR>References<BR><BR><B>Malware<BR></B>Introduction<BR>Computer Viruses<BR>Computer Worms <BR>Worm Component<BR>Worm Examples <BR>Polymorphic Worms: Definition and Anatomy<BR>Prevention and Detection of Worms<BR>Intrusion Detection Systems<BR>Firewalls <BR>References <BR><BR><B>Honeypots<BR></B>Definition and History of Honeypots<BR>Types of Threats<BR>Value of Honeypots<BR>Honeypot Types Based on Interaction Level<BR>Overview of Five Honeypots<BR>Conclusion<BR>References <BR><BR><B>Security Systems<BR></B>Firewall<BR>Antivirus<BR>Intrusion Detection and Prevention Systems<BR>References <BR><BR><B>Zero-Day Polymorphic Worms Collection Method<BR></B>Motivation of Double-Honeynet System<BR>Double-Honeynet Architecture<BR>Software <BR>Double-Honeynet System Configurations <BR>Summary <BR>References<BR></P> 
588 |a Description based on CIP data; item not viewed. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
700 1 |a Rehman, Habib-ur,  |e author. 
776 0 8 |i Print version :  |z 9781498702195 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781498702201/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP