Honeypots and routers collecting internet attacks

An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This can be accomplished through the use of honeypots and routers. This book provides readers with an understanding of honeypot concepts and architecture as we...

Descripción completa

Detalles Bibliográficos
Otros Autores: Mohammed, Mohssen, 1982, author (author), Rehman, Habib-ur, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton ; London : CRC Press [2016]
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629697106719
Descripción
Sumario:An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This can be accomplished through the use of honeypots and routers. This book provides readers with an understanding of honeypot concepts and architecture as well as the skills to deploy the best honeypot and router solutions for one's environment. It will arm readers with the expertise needed to track attackers and learn about their source, tools, and tactics.
Notas:An Auerbach book.
Descripción Física:1 online resource (192 p.)
Bibliografía:Includes bibliographical references at the end of each chapters.
ISBN:9781040075494
9780429171956
9781498702201