This book has recipes and tool development expertise and describe projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.
This book has recipes and tool development expertise and describe projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.
Anand Handa is a researcher and executive project engineer at the C3i Center at the Indian Institute of Technology Kanpur. His research interests are at the intersection of Machine learning and Cyber security. His role at C3i involves working on projects having malware analysis and IDS as significant components.
Inhaltsangabe
PART ONE: Web Application Security 1. OWASP G0rking - Exploiting the Hidden Aspects of Google's Search Capabilities 2. OSS Known Vulnerability Scanner - Helping Software Developers Detect Third Party Dependency Vulnerabilities in Real Time PART TWO: Malware Analysis 3. Detecting Malware using Machine Learning 4. New Age Attack Vectors - JPEG Images Machine Learning Based Solution for the Detection of Malicious JPEG Images 5. Live Monitoring of Malware Attacks on Cloud using a Windows Agent-Based Solution 6. Malware Too Needs Attention PART THREE: IDS 7. Implementation of Intrusion Detection System and Deception Technologies using Open-Source Tools for Small Business 8. Attack Vector Analysis with New Benchmark 9. Stealpot Honeypot Network
PART ONE: Web Application Security 1. OWASP G0rking - Exploiting the Hidden Aspects of Google's Search Capabilities 2. OSS Known Vulnerability Scanner - Helping Software Developers Detect Third Party Dependency Vulnerabilities in Real Time PART TWO: Malware Analysis 3. Detecting Malware using Machine Learning 4. New Age Attack Vectors - JPEG Images Machine Learning Based Solution for the Detection of Malicious JPEG Images 5. Live Monitoring of Malware Attacks on Cloud using a Windows Agent-Based Solution 6. Malware Too Needs Attention PART THREE: IDS 7. Implementation of Intrusion Detection System and Deception Technologies using Open-Source Tools for Small Business 8. Attack Vector Analysis with New Benchmark 9. Stealpot Honeypot Network
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826