There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them,as well as better understand and monitor their systems.
Silence on the Wire dissects several unique and fascinating security andprivacy problems associated with the technologies and protocols used in everydaycomputing, and shows how to use this knowledge to learn more about others or tobetter defend systems. By taking an indepth look at modern computing, from hardwareon up, the book helps the system administrator to better understand security issues,and to approach networking from a new, more creative perspective. The sys admin canapply this knowledge to network monitoring, policy enforcement, evidence analysis,IDS, honeypots, firewalls, and forensics.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them,as well as better understand and monitor their systems.
Silence on the Wire dissects several unique and fascinating security andprivacy problems associated with the technologies and protocols used in everydaycomputing, and shows how to use this knowledge to learn more about others or tobetter defend systems. By taking an indepth look at modern computing, from hardwareon up, the book helps the system administrator to better understand security issues,and to approach networking from a new, more creative perspective. The sys admin canapply this knowledge to network monitoring, policy enforcement, evidence analysis,IDS, honeypots, firewalls, and forensics.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerGratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: Studibuch, Stuttgart, Deutschland
paperback. Zustand: Gut. 281 Seiten; 9781593270469.3 Gewicht in Gramm: 1. Artikel-Nr. 775124
Anzahl: 1 verfügbar
Anbieter: medimops, Berlin, Deutschland
Zustand: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages. Artikel-Nr. M01593270461-V
Anzahl: 1 verfügbar
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
Paperback. Zustand: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Artikel-Nr. GOR003058041
Anzahl: 1 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Michal Zalewski ist ein international anerkannter Experte fuer Informationssicherheit und Verfasser zahlreicher wegbereitender Forschungsarbeiten im Bereich der IT-Security. Er hat Hunderte bedeutende Sicherheitsluecken entdeckt, und sein Name taucht regelmaess. Artikel-Nr. 4225259
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - Written by a well-known figure in the security/hacking community, this book stimulates readers to think more creatively about security problems and focuses on non-trivial and significant problems, not hype. The captivating narrative examines the journey of a packet of information, from input to destination, the secrets it divulges, and the security problems it faces along the way. Artikel-Nr. 9781593270469
Anzahl: 2 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. illustrated edition. 312 pages. 9.00x7.00x1.00 inches. In Stock. Artikel-Nr. x-1593270461
Anzahl: 2 verfügbar