Botnet Detection Botnet Detection
Advances in Information Security

Botnet Detection

Countering the Largest Security Threat

Wenke Lee and Others
    • $129.99
    • $129.99

Publisher Description

Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat.

Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based on the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets. It provides botnet detection techniques and response strategies, as well as the latest results from leading academic, industry and government researchers.

Botnet Detection: Countering the Largest Security Threat is intended for researchers and practitioners in industry. This book is also appropriate as a secondary text or reference book for advanced-level students in computer science.

GENRE
Computers & Internet
RELEASED
2007
October 23
LANGUAGE
EN
English
LENGTH
180
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
2.4
MB
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2019
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2020
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2008
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2016
Information Security Applications Information Security Applications
2014
Ubiquitous Security Ubiquitous Security
2022
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007