Buch, Englisch, Band 37, 254 Seiten, Format (B × H): 167 mm x 242 mm, Gewicht: 1230 g
Buch, Englisch, Band 37, 254 Seiten, Format (B × H): 167 mm x 242 mm, Gewicht: 1230 g
Reihe: Advances in Information Security
ISBN: 978-0-387-74389-9
Verlag: Springer Us
Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes, or vulnerabilities, in a computer, network, or application. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and pseudo code, which enable a user to identify if an application/protocol is vulnerable. If an application is found to be vulnerable, then a user will be able to understand the complexity and the theory behind the vulnerability. This edited volume also includes case studies that discuss the latest exploits.
Zielgruppe
Professional/practitioner
Fachgebiete
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
Weitere Infos & Material
Wireless Security.- Vulnerability Analysis for Mail Protocols.- Vulnerability Analysis for FTP and TFTP.- Vulnerability Analysis for HTTP.- Vulnerability Analysis for DNS and DHCP.- Vulnerability Analysis for SNMP and LDAP.- Vulnerability Analysis for RPC.- Malware Analysis.- Reverse Engineering.