The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with…mehr
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.
Artikelnr. des Verlages: B978-1-59749-135-8.X5000-8
Erscheinungstermin: 31. Januar 2007
Englisch
Abmessung: 228.6mm
Gewicht: 658g
ISBN-13: 9781597491358
ISBN-10: 1597491357
Artikelnr.: 21166648
Autorenporträt
Craig A Schiller (CISSP-ISSMP, ISSAP) is the CISO for Portland State University and President of Hawkeye Security Training, LLC. He is the primary author of the first Generally Accepted System Security Principles. He is a co-author of "Combating Spyware in the Enterprise? and "Winternals? from Syngress, several editions of the Handbook of Information Security Management, and a contributing author to Data Security Management. Mr. Schiller has co-founded two ISSA chapters, the Central Plains chapter and the Texas Gulf Coast Chapter.
Jim Binkley is a teacher, network engineer, and researcher in the Computer Science Department at Portland State University. Jim has twenty five years of experience with UNIX operating system internals and twenty years of experience with TCP/IP networking. Jim teaches a graduate sequence of networking classes including TCP/IP, routing, and network security, and also teaches operating system classes including Linux O.S. internals, Linux Device Drivers, and BSD TCP/IP stack internals.
Inhaltsangabe
Botnets: A Call to Action Botnets Overview Alternative Botnet C&Cs Common Botnets Botnet Detection: Tools and Techniques Ourmon: Overview and Installation Ourmon: Anomaly Detection Tools IRC and Botnets Advanced Ourmon Techniques Using Sandbox Tools for Botnets Intelligence Resources Responding to Botnets
Botnets: A Call to Action Botnets Overview Alternative Botnet C&Cs Common Botnets Botnet Detection: Tools and Techniques Ourmon: Overview and Installation Ourmon: Anomaly Detection Tools IRC and Botnets Advanced Ourmon Techniques Using Sandbox Tools for Botnets Intelligence Resources Responding to Botnets
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497