Honeypots and routers collecting internet attacks

An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This can be accomplished through the use of honeypots and routers. This book provides readers with an understanding of honeypot concepts and architecture as we...

Descripción completa

Detalles Bibliográficos
Otros Autores: Mohammed, Mohssen, 1982, author (author), Rehman, Habib-ur, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton ; London : CRC Press [2016]
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629697106719

Ejemplares similares