0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Network Security Traceback Attack and React in the United States Department of Defense Network (Hardcover): Edmond K. Machie Network Security Traceback Attack and React in the United States Department of Defense Network (Hardcover)
Edmond K. Machie
R1,699 Discovery Miles 16 990 Ships in 10 - 15 working days

Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (DoS). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.

Network Security Traceback Attack and React in the United States Department of Defense Network (Paperback): Edmond K. Machie Network Security Traceback Attack and React in the United States Department of Defense Network (Paperback)
Edmond K. Machie
R1,524 Discovery Miles 15 240 Ships in 18 - 22 working days

Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (DoS). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
How the World Is Making Our Children Mad…
Louis Weinstock Paperback R472 R445 Discovery Miles 4 450
Business Management for Entrepreneurs…
Cecile Nieuwenhuizen Paperback R450 R399 Discovery Miles 3 990
Beethoven's Symphony No. 9
Alexander Rehding Hardcover R2,462 Discovery Miles 24 620
About Tryphena - Hardy and His Young…
Nicholas Hillyard Paperback R331 Discovery Miles 3 310
Croxley JD432 A4 Irish 72Pg Nature Study…
R165 Discovery Miles 1 650
How to Cheat at Configuring VmWare ESX…
David Rule Paperback R1,084 R842 Discovery Miles 8 420
Treeline 2 Quire A4 Hard Cover Book…
R83 Discovery Miles 830
Biometric Security and Privacy…
Richard Jiang, Somaya Al-Maadeed, … Hardcover R4,834 Discovery Miles 48 340
Real Food Kids Will Love - Over 100…
Annabel Karmel Hardcover  (4)
R515 R476 Discovery Miles 4 760
Diensplig - Hoekom Stotter Ons Pa's So?
Anelia Heese Paperback R310 R277 Discovery Miles 2 770

 

Partners