0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Network Security Traceback Attack and React in the United States Department of Defense Network (Hardcover): Edmond K. Machie Network Security Traceback Attack and React in the United States Department of Defense Network (Hardcover)
Edmond K. Machie
R1,669 Discovery Miles 16 690 Ships in 12 - 17 working days

Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (DoS). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.

Network Security Traceback Attack and React in the United States Department of Defense Network (Paperback): Edmond K. Machie Network Security Traceback Attack and React in the United States Department of Defense Network (Paperback)
Edmond K. Machie
R1,591 Discovery Miles 15 910 Ships in 10 - 15 working days

Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (DoS). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Nintendo Joy-Con Neon Controller Pair…
R1,899 R1,729 Discovery Miles 17 290
Poldark: Series 1-2
Aidan Turner, Eleanor Tomlinson, … Blu-ray disc  (1)
R53 Discovery Miles 530
Return Of The Dream Canteen
Red Hot Chili Peppers CD R127 Discovery Miles 1 270
Christmas Nativity With House & Cross…
R1,699 R1,185 Discovery Miles 11 850
The Northman
Alexander Skarsgard, Nicole Kidman, … Blu-ray disc  (1)
R210 Discovery Miles 2 100
Dala A2 Sketch Pad (120gsm)(36 Sheets)
R260 Discovery Miles 2 600
Midnights
Taylor Swift CD R394 Discovery Miles 3 940
3 Layer Fabric Face Mask (Blue)
R15 Discovery Miles 150
Expensive Poverty - Why Aid Fails And…
Greg Mills Paperback R360 R309 Discovery Miles 3 090
Zap! Air Dry Pottery Kit
Kit R250 R195 Discovery Miles 1 950

 

Partners