0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Network Security Traceback Attack and React in the United States Department of Defense Network (Hardcover): Edmond K. Machie Network Security Traceback Attack and React in the United States Department of Defense Network (Hardcover)
Edmond K. Machie
R1,699 Discovery Miles 16 990 Ships in 10 - 15 working days

Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (DoS). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.

Network Security Traceback Attack and React in the United States Department of Defense Network (Paperback): Edmond K. Machie Network Security Traceback Attack and React in the United States Department of Defense Network (Paperback)
Edmond K. Machie
R1,524 Discovery Miles 15 240 Ships in 18 - 22 working days

Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (DoS). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Longest March
Fred Khumalo Paperback R280 R221 Discovery Miles 2 210
A Place To Hide
Ronald H. Balson Paperback R365 R331 Discovery Miles 3 310
Strangers In Time
David Baldacci Paperback R385 R349 Discovery Miles 3 490
Na 'n Plaas In Afrika
Irma Joubert Paperback R390 R366 Discovery Miles 3 660
Dancing The Death Drill
Fred Khumalo Paperback  (10)
R294 Discovery Miles 2 940
From London With Love
Katie Fforde Paperback R395 R353 Discovery Miles 3 530
On Living Stone - Salome's Story
Heather Kaufman Paperback R270 R209 Discovery Miles 2 090
Six Days In Bombay
Alka Joshi Paperback R385 R344 Discovery Miles 3 440
The New Kingdom
Wilbur Smith, Mark Chadbourn Hardcover  (1)
R589 R530 Discovery Miles 5 300
Children Of Sugarcane
Joanne Joseph Paperback  (3)
R320 R286 Discovery Miles 2 860

 

Partners