Distributed Tracing of Intruders
Language: en
Pages: 178
Authors: Stuart Gresley Staniford-Chen
Categories:
Type: BOOK - Published: 1995 - Publisher:

GET EBOOK

Unwelcome intrusions into computer systems are being perpetrated by strangers, and the number of such incidents is rising steadily. One of the things that facil
Tracing Intruders behind Stepping Stones
Language: en
Pages:
Authors:
Categories:
Type: BOOK - Published: 2004 - Publisher:

GET EBOOK

Network based intruders seldom attack directly from their own hosts but rather stage their attacks through intermediate 'stepping stones' to conceal their ident
Information Security
Language: en
Pages: 502
Authors: Agnes Hui Chan
Categories: Computers
Type: BOOK - Published: 2007-10-23 - Publisher: Springer

GET EBOOK

As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide var
Tracing Intruders Behind Stepping Stones
Language: en
Pages: 143
Authors: Xinyuan Wang
Categories:
Type: BOOK - Published: 2004 - Publisher:

GET EBOOK

Keywords: Network Security, Correlation, Stepping Stones, Intrusion Tracing.
Intrusion Detection
Language: en
Pages: 224
Authors: Edward G. Amoroso
Categories: Computers
Type: BOOK - Published: 1999 - Publisher:

GET EBOOK