Know your enemy : learning about security threats
Material type:![Computer file](/opac-tmpl/lib/famfamfam/CF.png)
- 005.8 KNO 22
Item type | Current library | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|
![]() |
Calcutta | 005.8 KNO (Browse shelf(Opens below)) | Available | IIMC-C117326 |
The Honeynet Project
Aimed at both security professionals and those with a non-technical background, this book teaches the technical skills needed to study a blackhat attack and learn from it. It guides on how to plan, build, and maintain first-and second-generation, virtual, and distributed honey-nets; how to capture and analyze data through a honey net, including the latest on reverse engineering and forensics for Windows, Unix, and networks;Understanding the enemy,including real examples of incidents and compromised systems, types of attacks, and profiling.
There are no comments on this title.