ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Networking

Honeypots and Routers: Collecting Internet Attacks

| £58.28 | €65.55 | Ca$94.56 | Au$93.32
by Mohssen Mohammed & Habib-ur Rehman
What is this?DRM-PDF | by download   add to wish list
Honeypots and Routers: Collecting Internet Attacks by Mohssen Mohammed & Habib-ur Rehman

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment.

Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security:

  • Computer networks: technologies, routing protocols, and Internet architecture
  • Information and network security: concepts, challenges, and mechanisms
  • System vulnerability levels: network, operating system, and applications

The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it.

The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics.

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 797238

Ebook Details
Pages: 190
Size: 4.4 MB
Publisher: CRC Press
Date published:   2015
ISBN: 9781498702201 (DRM-PDF)

DRM Settings
Copying:not allowed
Printing:not allowed
Read Aloud:  not allowed

This product is listed in the following categories:

Nonfiction > Computers > Internet
Nonfiction > Computers > Security
Nonfiction > Computers > Networking

These authors have products in the following categories:

Nonfiction > Computers > Security
Nonfiction > Computers > Programming > Software Development
Nonfiction > Computers > Machine Theory
Nonfiction > Computers > Internet
Nonfiction > Computers > Networking
Nonfiction > Mathematics > Applied
Nonfiction > Mathematics > Arithmetic

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

© 2016