0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Honeypots and Routers - Collecting Internet Attacks (Paperback): Mohssen Mohammed, Habib ur Rehman Honeypots and Routers - Collecting Internet Attacks (Paperback)
Mohssen Mohammed, Habib ur Rehman
R1,376 Discovery Miles 13 760 Ships in 12 - 17 working days

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment. Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security: Computer networks: technologies, routing protocols, and Internet architecture Information and network security: concepts, challenges, and mechanisms System vulnerability levels: network, operating system, and applications The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it. The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics.

Honeypots and Routers - Collecting Internet Attacks (Hardcover): Mohssen Mohammed, Habib ur Rehman Honeypots and Routers - Collecting Internet Attacks (Hardcover)
Mohssen Mohammed, Habib ur Rehman
R1,867 Discovery Miles 18 670 Ships in 12 - 17 working days

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment. Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security: Computer networks: technologies, routing protocols, and Internet architecture Information and network security: concepts, challenges, and mechanisms System vulnerability levels: network, operating system, and applications The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it. The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics.

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Hardcover): Mohssen Mohammed, Al-Sakib Khan... Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Hardcover)
Mohssen Mohammed, Al-Sakib Khan Pathan
R2,654 Discovery Miles 26 540 Ships in 12 - 17 working days

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There's also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.

Machine Learning - Algorithms and Applications (Paperback): Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed... Machine Learning - Algorithms and Applications (Paperback)
Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed Bashier
R1,440 Discovery Miles 14 400 Ships in 12 - 17 working days

Machine learning, one of the top emerging sciences, has an extremely broad range of applications. However, many books on the subject provide only a theoretical approach, making it difficult for a newcomer to grasp the subject material. This book provides a more practical approach by explaining the concepts of machine learning algorithms and describing the areas of application for each algorithm, using simple practical examples to demonstrate each algorithm and showing how different issues related to these algorithms are applied.

Machine Learning - Algorithms and Applications (Hardcover): Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed... Machine Learning - Algorithms and Applications (Hardcover)
Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed Bashier
R2,583 Discovery Miles 25 830 Ships in 12 - 17 working days

Machine learning, one of the top emerging sciences, has an extremely broad range of applications. However, many books on the subject provide only a theoretical approach, making it difficult for a newcomer to grasp the subject material. This book provides a more practical approach by explaining the concepts of machine learning algorithms and describing the areas of application for each algorithm, using simple practical examples to demonstrate each algorithm and showing how different issues related to these algorithms are applied.

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Paperback): Mohssen Mohammed, Al-Sakib Khan... Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Paperback)
Mohssen Mohammed, Al-Sakib Khan Pathan
R1,815 Discovery Miles 18 150 Ships in 12 - 17 working days

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There's also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Man In Die Maan
Etienne Fourie Paperback R360 R49 Discovery Miles 490
Top Gun: Maverick - Music From The…
Various Artists CD R215 Discovery Miles 2 150
Playseat Evolution Racing Chair (Black)
 (3)
R8,999 Discovery Miles 89 990
Students Must Rise - Youth Struggle In…
Anne Heffernan, Noor Nieftagodien Paperback  (1)
R395 R309 Discovery Miles 3 090
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Estee Lauder Beautiful Belle Eau De…
R2,241 R1,652 Discovery Miles 16 520
HP 330 Wireless Keyboard and Mouse Combo
R800 R450 Discovery Miles 4 500
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
White Glo Floss Charcoal Mint
R50 Discovery Miles 500
White Glo Traveller's Pack
R70 Discovery Miles 700

 

Partners