Know your enemy : learning about security threats

Material type: Computer fileComputer filePublication details: Boston : Addison-Wesley, 2004Edition: 2nd edDescription: 1 CD-ROMSubject(s): DDC classification:
  • 005.8 KNO 22
Summary: Aimed at both security professionals and those with a non-technical background, this book teaches the technical skills needed to study a blackhat attack and learn from it. It guides on how to plan, build, and maintain first-and second-generation, virtual, and distributed honey-nets; how to capture and analyze data through a honey net, including the latest on reverse engineering and forensics for Windows, Unix, and networks;Understanding the enemy,including real examples of incidents and compromised systems, types of attacks, and profiling.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Book Book Calcutta 005.8 KNO (Browse shelf(Opens below)) Available IIMC-C117326
Total holds: 0

The Honeynet Project

Aimed at both security professionals and those with a non-technical background, this book teaches the technical skills needed to study a blackhat attack and learn from it. It guides on how to plan, build, and maintain first-and second-generation, virtual, and distributed honey-nets; how to capture and analyze data through a honey net, including the latest on reverse engineering and forensics for Windows, Unix, and networks;Understanding the enemy,including real examples of incidents and compromised systems, types of attacks, and profiling.

There are no comments on this title.

to post a comment.

Powered by Koha