Honeypots and routers collecting internet attacks

An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This can be accomplished through the use of honeypots and routers. This book provides readers with an understanding of honeypot concepts and architecture as we...

Descripción completa

Detalles Bibliográficos
Otros Autores: Mohammed, Mohssen, 1982, author (author), Rehman, Habib-ur, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton ; London : CRC Press [2016]
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629697106719
Tabla de Contenidos:
  • chapter 1. Computer networks
  • chapter 2. Information system security
  • chapter 3. Intrusions and vulnerabilities
  • chapter 4. Malware
  • chapter 5. A theoretical guide to honeypots
  • chapter 6. Security systems
  • chapter 7. Collecting zero-day polymorphic worms using double-honeynet.