Honeypots and routers collecting internet attacks
An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This can be accomplished through the use of honeypots and routers. This book provides readers with an understanding of honeypot concepts and architecture as we...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton ; London :
CRC Press
[2016]
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629697106719 |
Sumario: | An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This can be accomplished through the use of honeypots and routers. This book provides readers with an understanding of honeypot concepts and architecture as well as the skills to deploy the best honeypot and router solutions for one's environment. It will arm readers with the expertise needed to track attackers and learn about their source, tools, and tactics. |
---|---|
Notas: | An Auerbach book. |
Descripción Física: | 1 online resource (192 p.) |
Bibliografía: | Includes bibliographical references at the end of each chapters. |
ISBN: | 9781040075494 9780429171956 9781498702201 |