Vulnerability Analysis and Defense for the Internet
Editat de Abhishek Singhen Limba Engleză Hardback – 18 ian 2008
Preț: 624.57 lei
Preț vechi: 780.72 lei
-20% Nou
Puncte Express: 937
Preț estimativ în valută:
110.52€ • 128.89$ • 97.04£
110.52€ • 128.89$ • 97.04£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780387743899
ISBN-10: 0387743898
Pagini: 254
Ilustrații: XVI, 254 p.
Dimensiuni: 167 x 242 x 25 mm
Greutate: 0.53 kg
Ediția:2008 edition
Editura: Springer Us
Locul publicării:New York, NY, United States
ISBN-10: 0387743898
Pagini: 254
Ilustrații: XVI, 254 p.
Dimensiuni: 167 x 242 x 25 mm
Greutate: 0.53 kg
Ediția:2008 edition
Editura: Springer Us
Locul publicării:New York, NY, United States
Public țintă
Professional/practitionerCuprins
Wireless Security.- Vulnerability Analysis for Mail Protocols.- Vulnerability Analysis for FTP and TFTP.- Vulnerability Analysis for HTTP.- Vulnerability Analysis for DNS and DHCP.- Vulnerability Analysis for SNMP and LDAP.- Vulnerability Analysis for RPC.- Malware Analysis.- Reverse Engineering.
Textul de pe ultima copertă
Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or an application. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use.
Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, which enables a user to identify whether an application/protocol is vulnerable and how the vulnerability affects the software. If an application is vulnerable, then a user will be able to understand the complexity, and the theory behind the vulnerability. This edited volume contributed by world leaders in this field, also provides psuedo code for effective signatures to prevent vulnerabilities and case studies where the latest exploits are discussed.
Vulnerability Analysis and Defense for the Internet is designed for a professional audience composed of practitioners and researchers in industry. This book is also useful as an advanced-level secondary text book in computer science.
Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, which enables a user to identify whether an application/protocol is vulnerable and how the vulnerability affects the software. If an application is vulnerable, then a user will be able to understand the complexity, and the theory behind the vulnerability. This edited volume contributed by world leaders in this field, also provides psuedo code for effective signatures to prevent vulnerabilities and case studies where the latest exploits are discussed.
Vulnerability Analysis and Defense for the Internet is designed for a professional audience composed of practitioners and researchers in industry. This book is also useful as an advanced-level secondary text book in computer science.
Caracteristici
Includes detail vulnerabilities in an application and how the vulnerability affects the software Provides a source code for effective signatures to prevent vulnerabilities Includes supplementary material: sn.pub/extras