• Anglický jazyk

Encrypted Attack Traffic Robustly correlated by Stepping Stones

Autor: Anil V. Turukmane

An attacker who has gained access to data pathways in your network is able to "listen in" or interpret (read) the traffic since the vast majority of network communications take place in an insecure or "clear text" format. This makes it possible for an attacker... Viac o knihe

Na objednávku, dodanie 2-4 týždne

40.68 €

bežná cena: 45.20 €

O knihe

An attacker who has gained access to data pathways in your network is able to "listen in" or interpret (read) the traffic since the vast majority of network communications take place in an insecure or "clear text" format. This makes it possible for an attacker to read the traffic. Snooping and sniffing are both terms that are used to describe when an adversary is monitoring your communications in order to gain information. The ability of a snoop to keep tabs on the network is typically the most significant threat to data security that network managers in an organization must contend with. It is possible for other people to access your data as it travels via the network if you do not use robust encryption services that are founded on cryptography.

  • Vydavateľstvo: LAP LAMBERT Academic Publishing
  • Rok vydania: 2022
  • Formát: Paperback
  • Rozmer: 220 x 150 mm
  • Jazyk: Anglický jazyk
  • ISBN: 9786205495247

Generuje redakčný systém BUXUS CMS spoločnosti ui42.