32,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 1-2 Wochen
payback
16 °P sammeln
  • Broschiertes Buch

An attacker who has gained access to data pathways in your network is able to "listen in" or interpret (read) the traffic since the vast majority of network communications take place in an insecure or "clear text" format. This makes it possible for an attacker to read the traffic. Snooping and sniffing are both terms that are used to describe when an adversary is monitoring your communications in order to gain information. The ability of a snoop to keep tabs on the network is typically the most significant threat to data security that network managers in an organization must contend with. It…mehr

Produktbeschreibung
An attacker who has gained access to data pathways in your network is able to "listen in" or interpret (read) the traffic since the vast majority of network communications take place in an insecure or "clear text" format. This makes it possible for an attacker to read the traffic. Snooping and sniffing are both terms that are used to describe when an adversary is monitoring your communications in order to gain information. The ability of a snoop to keep tabs on the network is typically the most significant threat to data security that network managers in an organization must contend with. It is possible for other people to access your data as it travels via the network if you do not use robust encryption services that are founded on cryptography.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
Ich, Dr. Anil V. Turukmane, habe ein Post-Doc- und PhD-Studium in Informatik und Ingenieurwesen abgeschlossen und arbeite derzeit als Professor in der Fakultät für Informatik und Ingenieurwesen an der VIT-AP University. Andra Pradesh, INDIEN. Ich habe mehr als 40 Forschungsarbeiten in verschiedenen internationalen Fachzeitschriften und Konferenzen wie SCI, SCOPUS Index veröffentlicht.