Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Rockland, MA :Syngress Publishing,
    UID:
    almahu_9948026103902882
    Format: 1 online resource (417 p.)
    Edition: 1st edition
    ISBN: 1-281-03580-7 , 9786611035808 , 0-08-048829-3 , 1-59749-029-6
    Content: Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, crimin
    Note: Description based upon print version of record. , Cover; Contents; Foreword; Fictionalized Cases of Network Strike-Back, Self-Defense, and Revenge; PDA Perils: Revenge from the Palm of Your Hand; The Case of a WLAN Attacker: In the Booth; MD5: Exploiting the Generous; A VPN Victim's Story: Jack's Smirking Revenge; Network Protection: Cyber-Attacks Meet Physical Response; Network Insecurity: Taking Patch Management to the Masses; The Fight for the Primulus Network: Yaseen vs Nathan; Undermining the Network: A Breach of Trust; ADAM: Active Defense Algorithm and Model; Defending Your Right to Defend; MD5 to Be Considered Harmful Someday , When the Tables Turn: Passive Strike-BackIndex; Related Titles , English
    Additional Edition: ISBN 1-931836-20-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages