- Hinweis: Print on Demand. Lieferbar innerhalb von 7 bis 10 Tagen
- Hinweis: Lieferzeit ca. 1-2 Tage
- inkl. MwSt. & Versandkosten (innerhalb Deutschlands)
Autorenfreundlich Bücher kaufen?!
Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause Distributed denial of services (DDoS). Also include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.