Honeypots and routers collecting internet attacks
An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This can be accomplished through the use of honeypots and routers. This book provides readers with an understanding of honeypot concepts and architecture as we...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton ; London :
CRC Press
[2016]
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629697106719 |
Tabla de Contenidos:
- chapter 1. Computer networks
- chapter 2. Information system security
- chapter 3. Intrusions and vulnerabilities
- chapter 4. Malware
- chapter 5. A theoretical guide to honeypots
- chapter 6. Security systems
- chapter 7. Collecting zero-day polymorphic worms using double-honeynet.