Detection of Intrusions and Malware, and Vulnerability Assessment
Springer Berlin (Verlag)
978-3-642-14214-7 (ISBN)
Host Security.- HookScout: Proactive Binary-Centric Hook Detection.- Conqueror: Tamper-Proof Code Execution on Legacy Systems.- dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection.- Trends.- Evaluating Bluetooth as a Medium for Botnet Command and Control.- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype.- Covertly Probing Underground Economy Marketplaces.- Vulnerabilities.- Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners.- Organizing Large Scale Hacking Competitions.- Intrusion Detection.- An Online Adaptive Approach to Alert Correlation.- KIDS - Keyed Intrusion Detection System.- Web Security.- Modeling and Containment of Search Worms Targeting Web Applications.- HProxy: Client-Side Detection of SSL Stripping Attacks.
| Erscheint lt. Verlag | 7.7.2010 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XII, 219 p. 55 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Schlagworte | Algorithm analysis and problem complexity • Blue Tooth Botnets • Hacking • Hacking C • Hacking Competitions • Intrusion Detection • Network Security • overlay networks • Search Worms • security • Skype • Stripping Attacks • web security • Web Vulnerability |
| ISBN-10 | 3-642-14214-1 / 3642142141 |
| ISBN-13 | 978-3-642-14214-7 / 9783642142147 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich