0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Honeypots and Routers - Collecting Internet Attacks (Paperback): Mohssen Mohammed, Habib ur Rehman Honeypots and Routers - Collecting Internet Attacks (Paperback)
Mohssen Mohammed, Habib ur Rehman
R1,378 Discovery Miles 13 780 Ships in 10 - 15 working days

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment. Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security: Computer networks: technologies, routing protocols, and Internet architecture Information and network security: concepts, challenges, and mechanisms System vulnerability levels: network, operating system, and applications The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it. The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics.

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Hardcover): Mohssen Mohammed, Al-Sakib Khan... Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Hardcover)
Mohssen Mohammed, Al-Sakib Khan Pathan
R2,611 Discovery Miles 26 110 Ships in 10 - 15 working days

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There's also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.

Honeypots and Routers - Collecting Internet Attacks (Hardcover): Mohssen Mohammed, Habib ur Rehman Honeypots and Routers - Collecting Internet Attacks (Hardcover)
Mohssen Mohammed, Habib ur Rehman
R1,869 Discovery Miles 18 690 Ships in 10 - 15 working days

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment. Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security: Computer networks: technologies, routing protocols, and Internet architecture Information and network security: concepts, challenges, and mechanisms System vulnerability levels: network, operating system, and applications The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it. The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics.

Machine Learning - Algorithms and Applications (Paperback): Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed... Machine Learning - Algorithms and Applications (Paperback)
Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed Bashier
R1,381 Discovery Miles 13 810 Ships in 10 - 15 working days

Machine learning, one of the top emerging sciences, has an extremely broad range of applications. However, many books on the subject provide only a theoretical approach, making it difficult for a newcomer to grasp the subject material. This book provides a more practical approach by explaining the concepts of machine learning algorithms and describing the areas of application for each algorithm, using simple practical examples to demonstrate each algorithm and showing how different issues related to these algorithms are applied.

Machine Learning - Algorithms and Applications (Hardcover): Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed... Machine Learning - Algorithms and Applications (Hardcover)
Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed Bashier
R2,459 Discovery Miles 24 590 Ships in 10 - 15 working days

Machine learning, one of the top emerging sciences, has an extremely broad range of applications. However, many books on the subject provide only a theoretical approach, making it difficult for a newcomer to grasp the subject material. This book provides a more practical approach by explaining the concepts of machine learning algorithms and describing the areas of application for each algorithm, using simple practical examples to demonstrate each algorithm and showing how different issues related to these algorithms are applied.

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Paperback): Mohssen Mohammed, Al-Sakib Khan... Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Paperback)
Mohssen Mohammed, Al-Sakib Khan Pathan
R1,792 Discovery Miles 17 920 Ships in 10 - 15 working days

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There's also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Towards a Theory of United Nations…
A.B. Fetherston Hardcover R2,669 Discovery Miles 26 690
Churchill & Smuts - The Friendship
Richard Steyn Paperback  (6)
R320 R286 Discovery Miles 2 860
Student Solutions Manual for…
Steven S. Zumdahl, Susan A Zumdahl Paperback R1,080 R1,020 Discovery Miles 10 200
War Against The Jews - How To End Hamas…
Alan Dershowitz Hardcover R749 R673 Discovery Miles 6 730
Much Ado about (Practically) Nothing - A…
David Fisher Hardcover R1,258 Discovery Miles 12 580
South Asian in the Mid-South…
Iswari Pandey Paperback R1,387 Discovery Miles 13 870
What does Medial Frontal Cortex Signal…
Adam Thomas Brockett, Linda M. Amarante, … Hardcover R4,531 Discovery Miles 45 310
Critical Literacies - Global and…
Bogum Yoon Hardcover R1,843 Discovery Miles 18 430
The Wine & Beer Maker's Year - 75…
Roy Ekins Paperback  (1)
R345 Discovery Miles 3 450
Vergete wereld - Die…
Peter Delius, Tim Maggs, … Paperback R400 R369 Discovery Miles 3 690

 

Partners