Amazon cover image
Image from Amazon.com

Botnets : the killer web applications

By: Contributor(s): Material type: TextTextPublication details: Syngress, c2007. San Diego : Elsevier Science & Technology BooksDescription: xv, 464 pISBN:
  • 9781597491358
  • 9788131210444
Subject(s): DDC classification:
  • 005.8 SCH-B
LOC classification:
  • QA76.9.A25
Referex Security and NetworkingSummary: Annotation The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.* This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise* Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Books Books IIITD General Stacks Computer Science and Engineering 005.8 SCH-B (Browse shelf(Opens below)) Available 002939
Total holds: 0

License restrictions may limit access.

Annotation The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.* This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise* Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself

Scholarly & Professional Elsevier Science & Technology Books

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in