Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    München, Germany :Oldenbourg Verlag München,
    UID:
    almahu_9948318639402882
    Format: 1 online resource (236 pages) : , illustrations
    ISBN: 9783486711516 (e-book)
    Additional Edition: Print version: Göbel, Jan Gerrit. Client-Honeypots : exploring malicious websites. München, Germany : Oldenbourg Verlag München, c2011 ISBN 9783486705263
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    München :Oldenbourg Verlag,
    UID:
    almahu_BV044062928
    Format: 1 Online-Ressource (xix, 214 Seiten) : , Illustrationen, Diagramme.
    ISBN: 978-3-486-71151-6
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-486-70526-3
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Website ; Malware ; Honeypot ; Client ; Exploit ; Softwareschwachstelle
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    URL: Cover
    Author information: Göbel, Jan Gerrit, 1979-,
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Berlin ;Boston :Oldenbourg Wissenschaftsverlag,
    UID:
    edocfu_9958356064002883
    Format: 1 online resource (233p.)
    ISBN: 9783486711516
    Content: This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy.
    Content: With the increasing resilience of operating systems towards automated attacks, the application layer has come into the focus of criminals. Specially prepared websites in the World Wide Web compromise visitors by exploiting vulnerabilities in web browsers, emails with attached files exploit common email applications, and embedded links in instant messenger or Twitter messages lead to malware contaminated sites. This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy.
    Note: Front Matter -- , 1 Introduction -- , 2 Honeypot Basics -- , 3 An Introduction to Client-Side Exploits -- , 4 Protection and Analysis Tools -- , 5 A Survey of current Client-Side Honeypots -- , 6 Composing a Honeyclient-Framework -- , 7 Operating Selected Client-Side Honeypots -- , 8 Epilogue -- , Back Matter , In English.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783486711561?
Did you mean 9783486710151?
Did you mean 9783406711916?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages