Cart 0
Client-Honeypots
Click to zoom

Share this book

Client-Honeypots : Exploring Malicious Websites

Book Details

Format Hardback or Cased Book
ISBN-10 3486705261
ISBN-13 9783486705263
Publisher De Gruyter
Imprint De Gruyter Oldenbourg
Country of Manufacture GB
Country of Publication GB
Publication Date Dec 17th, 2010
Print length 233 Pages
Weight 456 grams
Ksh 16,400.00
Werezi Extended Catalogue 0 in stock

Delivery Location

Delivery fee: Select location

Secure
Quality
Fast
Introduces a weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. This book shows a few of the frequently used client application exploits and how they can be examined to get information about the underground economy.
This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy. With the increasing resilience of operating systems towards automated attacks, the application layer has come into the focus of criminals. Specially prepared websites in the World Wide Web compromise visitors by exploiting vulnerabilities in web browsers, emails with attached files exploit common email applications, and embedded links in instant messenger or Twitter messages lead to malware contaminated sites. This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy.

Get Client-Honeypots by at the best price and quality guaranteed only at Werezi Africa's largest book ecommerce store. The book was published by De Gruyter and it has pages.

Mind, Body, & Spirit

Shopping Cart

Africa largest book store

Sub Total:
Ebooks

Digital Library
Coming Soon

Our digital collection is currently being curated to ensure the best possible reading experience on Werezi. We'll be launching our Ebooks platform shortly.