Book Details

Vulnerability Analysis and Defense for the Internet

Publication year: 2008

ISBN: 978-0-387-74390-5

Internet Resource: Please Login to download book


This book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, which enables a user to identify whether an application/protocol is vulnerable and how the vulnerability affects the software. If an application is vulnerable, then a user will be able to understand the complexity, and the theory behind the vulnerability. This edited volume contributed by world leaders in this field, also provides psuedo code for effective signatures to prevent vulnerabilities and case studies where the latest exploits are discussed.


Subject: Computer Science, Analysis, Code, Countermeasures, DHCP, Defense, Internet, SNMP, Singh, Vulnerability, security