| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910463748803321 |
|
|
Autore |
Göbel Jan Gerrit |
|
|
Titolo |
Client-Honeypots : exploring malicious websites / / Jan Gerrit Göbel, Andreas Dewald ; with a foreword by Prof. Dr. Felix Freiling ; Kathrin Mönch, editor |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
München, Germany : , : Oldenbourg Verlag München, , 2011 |
|
©2011 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-306-77960-X |
3-486-71151-2 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (236 p.) |
|
|
|
|
|
|
Classificazione |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Matter -- 1 Introduction -- 2 Honeypot Basics -- 3 An Introduction to Client-Side Exploits -- 4 Protection and Analysis Tools -- 5 A Survey of current Client-Side Honeypots -- 6 Composing a Honeyclient-Framework -- 7 Operating Selected Client-Side Honeypots -- 8 Epilogue -- Back Matter |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
With the increasing resilience of operating systems towards automated attacks, the application layer has come into the focus of criminals. Specially prepared websites in the World Wide Web compromise visitors by exploiting vulnerabilities in web browsers, emails with attached files exploit common email applications, and embedded links in instant messenger or Twitter messages lead to malware contaminated sites. This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and |
|
|
|
|
|
|
|
|
|
|
|
|
|
how they can be examined to get more information about the underground economy. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910697876603321 |
|
|
Titolo |
Geopotential Research Mission, science, engineering, and program summary [[electronic resource] /] / edited by Thomas Keating ... [and others] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
[Washington, D.C.] : , : National Aeronautics and Space Administration, Scientific and Technical Information Branch, , 1986 |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 volume (various pagings) : digital, PDF file |
|
|
|
|
|
|
Collana |
|
NASA technical memorandum ; ; 86240 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Soggetti |
|
Earth gravitation |
Geomagnetism |
Geopotential |
Gravitational fields |
NASA programs |
Spacecraft design |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from title screen (viewed Dec. 3, 2008) |
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNISANNIOTSA0010620 |
|
|
Titolo |
2 |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Collocazione |
|
LT (AR) 22 B 25301POZZO LIB.ECON MON 4340 |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
| |