相關主題
商品描述
Description
- Analysis
- Countermeasures
- Defense
- Internet
- Singh
- Vulnerability
Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or an application. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use.
Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, which enables a user to identify whether an application/protocol is vulnerable and how the vulnerability affects the software. If an application is vulnerable, then a user will be able to understand the complexity, and the theory behind the vulnerability. This edited volume contributed by world leaders in this field, also provides psuedo code for effective signatures to prevent vulnerabilities and case studies where the latest exploits are discussed.
Vulnerability Analysis and Defense for the Internet is designed for a professional audience composed of practitioners and researchers in industry. This book is also useful as an advanced-level secondary text book in computer science.
商品描述(中文翻譯)
**描述**
漏洞分析,也稱為漏洞評估,是一個定義、識別和分類計算機、網絡或應用程序中的安全漏洞(vulnerabilities)的過程。此外,漏洞分析還可以預測提議的對策的有效性,並在實施後評估其實際效果。
**《互聯網的漏洞分析與防禦》**提供了數據包捕獲、流程圖以及對協議和逆向工程概念的詳細分析,使使用者能夠識別應用程序/協議是否存在漏洞,以及這些漏洞如何影響軟體。如果應用程序存在漏洞,使用者將能夠理解漏洞的複雜性及其背後的理論。這本由該領域的世界領袖貢獻的編輯書籍,還提供了有效簽名的偽代碼以防止漏洞,以及討論最新漏洞的案例研究。
**《互聯網的漏洞分析與防禦》**旨在為由業界實踐者和研究人員組成的專業讀者群體而設計。這本書也適合作為計算機科學的高級次級教科書。
撰寫對象:
實踐者、研究人員、高級學生
關鍵詞:
- 分析
- 對策
- 防禦
- 互聯網
- Singh
- 漏洞