People are checking their e-mails, surfing over the Internet, purchasing goods, playing online games, paying bills on the Internet everyday. However, while performing all these tasks, how many people think about security? Do they know the risks of being attacked, infected by malicious software? How many users are aware of that their computer may be used as zombie machines to target other victim systems? As technology is growing rapidly, newer attacks are appearing. Security is a key point to get over all these issues. In this thesis, we will make a real life scenario, using honeypots. Honeypot is a well designed system that attracts hackers into it. By luring the hacker into the system, it is possible to monitor the processes that are started and running. In other words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The aim of the honeypot is analyzing, understanding, watching and tracking hacker’s behaviours in order to create more secure systems. Honeypot is also very useful for future threats to keep track of new attacks.
"synopsis" may belong to another edition of this title.
Deniz Akkaya is an Information Security Engineer. Fabien Thalgott is a Software Engineer. They both completed their BSc and MSc degrees at Linnaeus University in Sweden. Deniz is specialized in Computer Science and Information Systems and Fabien is focused on Software Technology and Mobile Development.
"About this title" may belong to another edition of this title.
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLING22Oct2018170261852
Quantity: Over 20 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9783659113529
Quantity: Over 20 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9783659113529
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9783659113529
Quantity: Over 20 available
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New. Seller Inventory # 6666-IUK-9783659113529
Quantity: 10 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9783659113529_new
Quantity: Over 20 available
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -People are checking their e-mails, surfing over the Internet, purchasing goods, playing online games, paying bills on the Internet everyday. However, while performing all these tasks, how many people think about security Do they know the risks of being attacked, infected by malicious software How many users are aware of that their computer may be used as zombie machines to target other victim systems As technology is growing rapidly, newer attacks are appearing. Security is a key point to get over all these issues. In this thesis, we will make a real life scenario, using honeypots. Honeypot is a well designed system that attracts hackers into it. By luring the hacker into the system, it is possible to monitor the processes that are started and running. In other words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The aim of the honeypot is analyzing, understanding, watching and tracking hacker's behaviours in order to create more secure systems. Honeypot is also very useful for future threats to keep track of new attacks. 64 pp. Englisch. Seller Inventory # 9783659113529
Quantity: 2 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - People are checking their e-mails, surfing over the Internet, purchasing goods, playing online games, paying bills on the Internet everyday. However, while performing all these tasks, how many people think about security Do they know the risks of being attacked, infected by malicious software How many users are aware of that their computer may be used as zombie machines to target other victim systems As technology is growing rapidly, newer attacks are appearing. Security is a key point to get over all these issues. In this thesis, we will make a real life scenario, using honeypots. Honeypot is a well designed system that attracts hackers into it. By luring the hacker into the system, it is possible to monitor the processes that are started and running. In other words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The aim of the honeypot is analyzing, understanding, watching and tracking hacker's behaviours in order to create more secure systems. Honeypot is also very useful for future threats to keep track of new attacks. Seller Inventory # 9783659113529
Quantity: 1 available
Seller: moluna, Greven, Germany
Kartoniert / Broschiert. Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Akkaya DenizDeniz Akkaya is an Information Security Engineer. Fabien Thalgott is a Software Engineer. They both completed their BSc and MSc degrees at Linnaeus University in Sweden. Deniz is specialized in Computer Science and Inform. Seller Inventory # 5132273
Quantity: Over 20 available