Cantitate/Preț
Produs

Vulnerability Analysis and Defense for the Internet: Advances in Information Security, cartea 37

Editat de Abhishek Singh Contribuţii de B. Singh, H. Joseph
en Limba Engleză Hardback – 18 ian 2008
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Although these attacks are not new and are well known, the number of vulnerabilities disclosed to the public jumped nearly 5 percent during the first six months of 2007. This accounts to be the fourth year report, which shows the raise in vulnerability (see the news link on security focus http://www.securityfocus.com/brief/614). In January 2007, a vulnerable network resulted in a theft of 45.6 million credit card numbers in TJX companies due to unauthorized intrusion. A good protocol analysis and effective signature writing is one of the - fective method to prevent vulnerability and minimize the chances of intrusion in the network. However, protocol analysis poses two challenges namely false po- tive and evasion. If the signature to prevent the vulnerability is not written pr- erly, it will result in dropping of a valid traffic thereby resulting in false positive. An effective signature should also consider the chances of evasion; otherwise a malicious attacker can use the variant of exploit and evade the protection provided by the IDS/IPS.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 63925 lei  6-8 săpt.
  Springer Us – 19 noi 2010 63925 lei  6-8 săpt.
Hardback (1) 64547 lei  6-8 săpt.
  Springer Us – 18 ian 2008 64547 lei  6-8 săpt.

Din seria Advances in Information Security

Preț: 64547 lei

Preț vechi: 75937 lei
-15% Nou

Puncte Express: 968

Preț estimativ în valută:
12353 12744$ 10455£

Carte tipărită la comandă

Livrare economică 04-18 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780387743899
ISBN-10: 0387743898
Pagini: 254
Ilustrații: XVI, 254 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.56 kg
Ediția:2008
Editura: Springer Us
Colecția Springer
Seria Advances in Information Security

Locul publicării:New York, NY, United States

Public țintă

Professional/practitioner

Cuprins

Wireless Security.- Vulnerability Analysis for Mail Protocols.- Vulnerability Analysis for FTP and TFTP.- Vulnerability Analysis for HTTP.- Vulnerability Analysis for DNS and DHCP.- Vulnerability Analysis for SNMP and LDAP.- Vulnerability Analysis for RPC.- Malware Analysis.- Reverse Engineering.

Textul de pe ultima copertă

Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or an application. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use.
Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, which enables a user to identify whether an application/protocol is vulnerable and how the vulnerability affects the software. If an application is vulnerable, then a user will be able to understand the complexity, and the theory behind the vulnerability. This edited volume contributed by world leaders in this field, also provides psuedo code for effective signatures to prevent vulnerabilities and case studies where the latest exploits are discussed.
Vulnerability Analysis and Defense for the Internet is designed for a professional audience composed of practitioners and researchers in industry. This book is also useful as an advanced-level secondary text book in computer science.
 
 

Caracteristici

Includes detail vulnerabilities in an application and how the vulnerability affects the software Provides a source code for effective signatures to prevent vulnerabilities Includes supplementary material: sn.pub/extras