000 | 03213nam a2200517 i 4500 | ||
---|---|---|---|
001 | EBC1220106 | ||
003 | MiAaPQ | ||
005 | 20240120140913.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 130226t20132013flua ob 001 0 eng|d | ||
020 | _z9781466557277 | ||
020 |
_a9781466557284 _q(electronic bk.) |
||
035 | _a(MiAaPQ)EBC1220106 | ||
035 | _a(Au-PeEL)EBL1220106 | ||
035 | _a(CaPaEBR)ebr11009162 | ||
035 | _a(CaONFJC)MIL502345 | ||
035 | _a(OCoLC)853360683 | ||
040 |
_aMiAaPQ _beng _erda _epn _cMiAaPQ _dMiAaPQ |
||
050 | 4 |
_aQA76.76.C68 _bM64 2013 |
|
082 | 0 |
_a005.8 _bM697 |
|
100 | 1 |
_aMohammed, Mohssen, _d1982- _eauthor. |
|
245 | 1 | 0 |
_aAutomatic defense against zero-day polymorphic worms in communication networks / _cMohssen Mohammed, Al-Sakib Khan Pathan. |
264 | 1 |
_aBoca Raton, Florida : _bCRC Press, _c[2013] |
|
264 | 4 | _c2013 | |
300 |
_a1 online resource (317 pages) : _billustrations. |
||
336 |
_atext _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 0 | _aInformation security books | |
500 | _a"An Auerbach book." | ||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _ach. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms. | |
520 |
_a"A computer worm is a kind of malicious program that self-replicates automatically and quickly to compromise the security of a computer network. A polymorphic worm is able to change its payload in every infection attempt thereby forcing constant changes to ward off the attacks. Whenever a novel worm is detected in the Internet, the common approach is that the experts from security community analyze the worm code manually and produce a signature. The alternative approach is to find a way to automatically generate signatures that are relatively faster to generate and are of acceptable good quality. This book focuses on how we can automatically generate signatures for unknown polymorphic worms"-- _cProvided by publisher. |
||
588 | _aDescription based on print version record. | ||
590 | _aElectronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. | ||
650 | 0 | _aComputer viruses. | |
650 | 0 | _aComputer algorithms. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aMachine theory. | |
655 | 4 | _aElectronic books. | |
700 | 1 |
_aPathan, Al-Sakib Khan, _eauthor. |
|
776 | 0 | 8 |
_iPrint version: _aMohammed, Mohssen. _tAutomatic defense against zero-day polymorphic worms in communication networks. _dBoca Raton, Florida : CRC Press, [2013] _hxviii, 319 pages _kInformation security books _z9781466557277 _w(DLC)2012044400 |
797 | 2 | _aProQuest (Firm) | |
856 | 4 | 0 |
_uhttps://ebookcentral.proquest.com/lib/bacm-ebooks/detail.action?docID=1220106 _zClick to View |
999 |
_c97736 _d97736 |