Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Defense and Detection Strategies against Internet Worms

Buy
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security.

After examining how a worm is constructed and how its major life cycle steps are implemented, the book scrutinizes targets that worms have attacked over the years, and the likely targets of the immediate future. Moreover, this unique reference explains how to detect worms using a variety of mechanisms, and evaluates the strengths and weaknesses of three approaches—traffic analysis, honeypots and dark network monitors, and signature analysis. The book concludes with a discussion of four effective defenses against network worms, including host-based defenses, network firewalls and filters, application layer proxies, and a direct attack on the worm network itself.

Along with the enormous growth of the Internet, threats to all computers are increasing in severity, especially from worms, which can easily exploit any weakness in a network and can lead to its total compromise. This is the first book focused exclusively on Internet worms, offering computer and network security professionals solid worm detection and defense strategies for their work in the field.

Text focuses exclusively on Internet worms, offering worm detection and mitigation strategies to help professionals with their challenging work in the field.

About the Author

Jose Nazario is a senior software engineer at Arbor Networks, an internet security company. He is also a consultant and researcher at Crimelabs Research, a think tank and consulting firm. He holds a Ph.D. in biochemistry from Case Western Reserve University. He has published extensively.

(HTML tags aren't allowed.)

Radar Systems Analysis and Design Using MATLAB
Radar Systems Analysis and Design Using MATLAB
Numerous books have been written on Radar Systems and Radar Applications. A limited set of these books provides companion software. There is need for a comprehensive reference book that can provide the reader with hands-on-like experience. The ideal radar book, in my opinion, should serve as a conclusive, detailed, and useful reference for working...
Building Valve Amplifiers, Second Edition
Building Valve Amplifiers, Second Edition

Building Valve Amplifiers is a unique hands-on guide for anyone working with tube audio equipment--as an electronics hobbyist, audiophile or audio engineer. This 2nd Edition builds on the success of the first with technology and technique revisions throughout and, significantly, a major new self-build project, worked through...

Supply Chain Management Based on SAP Systems: Architecture and Planning Processes (SAP Excellence)
Supply Chain Management Based on SAP Systems: Architecture and Planning Processes (SAP Excellence)
Supply Chain Management (SCM) is not a buzzword like many others in management and IT - it is here to stay. "Megatrends" such as globalization and increasing specialization result in a complex division of labor at national and international levels. Lean and agile supply chains have become a major anagement target, and the...

Modeling & Simulation-Based Data Engineering: Introducing Pragmatics into Ontologies for Net-Centric Information Exchange
Modeling & Simulation-Based Data Engineering: Introducing Pragmatics into Ontologies for Net-Centric Information Exchange

Data Engineering has become a necessary and critical activity for business, engineering, and scientific organizations as the move to service oriented architecture and web services moves into full swing. Notably, the US Department of Defense is mandating that all of its agencies and contractors assume a defining presence on the Net-centric...

Essential PHP Security
Essential PHP Security

Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in...

Programming Microcontrollers in C, Second Edition (Embedded Technology Series)
Programming Microcontrollers in C, Second Edition (Embedded Technology Series)

Today, even more than when the first edition of this book was written, the use of microcontrollers has expanded to an almost unbelievable level.  A typical car has 15 microcontrollers. A modern home can have more than50 microcontrollers controlling everything from the thermostat, to the furnace, to the microwave. Microcontrollers are...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy