Low Price Guarantee
We Take School POs
Defense and Detection Strategies against Internet Worms
Contributor(s): Nazario, Jose (Author)

View larger image

ISBN: 1580535372     ISBN-13: 9781580535373
Publisher: Artech House Publishers
OUR PRICE: $99.75  

Binding Type: Hardcover - See All Available Formats & Editions
Published: November 2003
Qty:
Temporarily out of stock - Will ship within 2 to 5 weeks

Annotation: Along with the enormous growth of the Internet, threats to computers are increasing in severity. This is the first book focused exclusively on Internet worms, offering computer and network security professionals solid worm detection and defense strategies for their work in the field.

Click for more in this series: Artech House Computer Security Series
Additional Information
BISAC Categories:
- Computers | Security - General
- Business & Economics | E-commerce - General (see Also Computers - Electronic Commerce)
- Computers | Networking - General
Dewey: 005.8
LCCN: 2003058374
Series: Artech House Computer Security Series
Physical Information: 0.85" H x 7.06" W x 9.5" L (1.42 lbs) 287 pages
Features: Bibliography, Illustrated, Index
 
Descriptions, Reviews, Etc.
Publisher Description:
Focusing exclusively on Internet worms, this book offers you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defence techniques utilizing data from live networks, real IP addresses and commercial tools. It helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security. are implemented, the book scrutinizes targets that worms have attacked over the years and the likely targets of the immediate future. Moreover, this reference explains how to detect worms using a variety of mechanisms and evaluates the strengths and weaknesses of three approaches - traffic analysis, honeypots and dark network monitors, and signature analysis. The book concludes with a discussion of four effective defences against network worms, including host-based defences, network firewalls and filters, application layer proxies, and a direct attack on the worm network itself.
 
Customer ReviewsSubmit your own review
 
To tell a friend about this book, you must Sign In First!