Publication year: 2008
ISBN: 978-3-540-87403-4
Internet Resource: Please Login to download book
This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion and evasion, Web application testing and evasion, alert correlation and worm detection, as well as anomaly detection and network traffic analysis.
Subject: Computer Science, Management of Computing and Information Systems, Computers and Society, Cryptology, Computer Communication Networks, Systems and Data Security, GPU, alert reasoning, anomaly detection, attack graph, attack prevention, bayesian networks, data-flow, decoder detection, digital biometrics, dynamic programming, evasion, feature extraction, firewall, honeypots, insider-attack detection, internet threat