000 01441cam a2200337Ii 4500
001 9780429171956
008 180331t20162016flua ob 001 0 eng d
020 _a9780429171956
_q(e-book : PDF)
020 _z9781498702195
_q(hardback)
024 7 _a10.1201/b19660
_2doi
035 _a(OCoLC)930992613
040 _aFlBoTFG
_cFlBoTFG
_erda
050 4 _aQA76.9.A25
_bM64 2016
082 0 4 _a005.8
_bM697
100 1 _aMohammed, Mohssen,
_d1982,
_eauthor.
_915662
245 1 0 _aHoneypots and routers :
_bcollecting internet attacks /
_cMohssen Mohammed, Habib-ur Rehman.
264 1 _aBoca Raton ;
_aLondon :
_bCRC Press,
_c[2016]
264 4 _c©2016
300 _a1 online resource
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
500 _aAn Auerbach book.
505 0 _achapter 1. Computer networks -- chapter 2. Information system security -- chapter 3. Intrusions and vulnerabilities -- chapter 4. Malware -- chapter 5. A theoretical guide to honeypots -- chapter 6. Security systems -- chapter 7. Collecting zero-day polymorphic worms using double-honeynet.
650 0 _aData protection.
_97245
650 0 _aComputer crimes
_xPrevention.
_97872
700 1 _aRehman, Habib-ur,
_eauthor.
_915663
776 0 8 _iPrint version:
_z9781498702195
_w(DLC) 2016301988
856 4 0 _uhttps://www.taylorfrancis.com/books/9781498702201
_zClick here to view.
942 _cEBK
999 _c71053
_d71053