UID:
almahu_9947364130402882
Format:
XII, 219 p. 55 illus.
,
online resource.
ISBN:
9783642142154
Series Statement:
Lecture Notes in Computer Science, 6201
Note:
Host Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis – Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS – Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks.
In:
Springer eBooks
Additional Edition:
Printed edition: ISBN 9783642142147
Language:
English
DOI:
10.1007/978-3-642-14215-4
URL:
http://dx.doi.org/10.1007/978-3-642-14215-4