Deception Based Security
Protecting IT Systems by Obscuring Networks
Seiten
2011
Auerbach Publishers Inc. (Verlag)
9780849379475 (ISBN)
Auerbach Publishers Inc. (Verlag)
9780849379475 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Highlights a practical approach to enhancing security through obscurity using real-world scenarios. This book presents a description of how security through obscurity can improve the overall security profile of an organization. It provides comprehensive coverage of various major areas of interest to IT security experts.
Deception Based Security highlights a practical approach to enhancing security through obscurity using real-world scenarios. While relying solely on obscurity to secure network architecture has been proven unsuccessful, obscurity can offer numerous advantages to network defenders when used in unison with a broader set of tools. This book presents a detailed description of how security through obscurity can improve the overall security profile of an organization. With case studies, this text provides comprehensive coverage of all major areas of interest to IT security experts, including perimeters, networks, operating systems, applications, servers, intrusion detection, and incident response.
Deception Based Security highlights a practical approach to enhancing security through obscurity using real-world scenarios. While relying solely on obscurity to secure network architecture has been proven unsuccessful, obscurity can offer numerous advantages to network defenders when used in unison with a broader set of tools. This book presents a detailed description of how security through obscurity can improve the overall security profile of an organization. With case studies, this text provides comprehensive coverage of all major areas of interest to IT security experts, including perimeters, networks, operating systems, applications, servers, intrusion detection, and incident response.
SRA, Washington, District of Columbia, USA SRA, Sterling, Virginia, USA
Introduction. Perimeter/Network Security. Securing Operating Systems. Intrusion Detection and Incident Response Techniques. Other. Conclusion.
| Erscheint lt. Verlag | 15.7.2011 |
|---|---|
| Verlagsort | London |
| Sprache | englisch |
| Maße | 156 x 234 mm |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| ISBN-13 | 9780849379475 / 9780849379475 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2025)
C.H.Beck (Verlag)
CHF 16,80