Search Results: 'network attack'

Search

×
×
×
×
65 results for "network attack"
Global Networks of Power: Volume One By Garrison C. Gibson
Paperback: List Price: $29.95 $26.96 (excl. taxes) | You Save: 10%
Ships in 3-5 business days
Global Networks of Power captures an image of social and political substance of 2011 to early 2012. The U.S. Government has made Orwellian hate crimes legislation a general lever to intervene in... More > politically incorrect crimes upon special classes, given the military the right to exfiltrate U.S. citizens without legal review to unspecified foreign torture facilities where they may disappear forever and has forced corporate medical insurance upon all citizens and sought to force all religious organizations to provide birth control paraphernalia to employees through insurers. Following the attack on the rich in the World Trade Center in 2001 American democracy has been progressively stifled and wealth concentrated with onerous public debt building up along with high unemployment. The need for ecological economic reforms are ignored and the government cannot even reform capitalism to benefit American individualism. Gary C. Gibson writes of contemporary affairs from his own point of view.< Less
Distributed Multi-Domain Network Survivability By Feng Xu
Hardcover: List Price: $19.33 $16.43 (excl. taxes) | You Save: 15%
Ships in 6-8 business days.
As user services continue to grow, there is a growing need to improve network recovery across multiple domains. This is a complex problem due to scalability and privacy concerns across domains. Hence... More > multi-domain survivability schemes must operate in a distributed manner and also handle large multi-failure events, e.g., natural disasters, power outages, WMD attacks, etc. Now a wide range of recovery schemes have been developed for single domain networks, including pre-provisioned protection and post-fault restoration. However most multi-domain studies have only looked at protection strategies and do not handle multiple failures. To address these concerns, this work first proposes a new scheme to achieve improved protection with lower routing overheads. This scheme is then augmented with probabilistic features to handle multiple failures, and novel post-fault restoration methods proposed. Performance evaluation is then done using simulation and comparisons made with existing strategies.< Less
Improving Network Security: An Algorithm to Enforce Strong Router Password By Mohammed Farik
Hardcover: $24.60 (excl. taxes)
Ships in 6-8 business days.
(1 Ratings)
Master of IT minor-thesis presented at The University of Fiji
Black Book, Network Security, Ed. 10, Paperback, Color By Ixia Product Management
Paperback: $46.05 (excl. taxes)
Ships in 3-5 business days
Network Security - Network security is essential for homes, government organizations, and enterprises of all sizes. The number and types of attacks are enormous, and the devices used to defend... More > against them necessarily complex. This book provides an overview of network security and covers some of the test methodologies used to assess the effectiveness and performance impact of IPS/IDS, UTMs, and a new generation firewalls using attacks such as DoS/DDoS, as well as known vulnerabilities and malware. The last section of the book is dedicated on IPsec VPN test methodologies.< Less
Black Book, Network Security, Ed. 10, Paperback, B&W By Ixia Product Management
Paperback: $8.60 (excl. taxes)
Ships in 3-5 business days
Network Security - Network security is essential for homes, government organizations, and enterprises of all sizes. The number and types of attacks are enormous, and the devices used to defend... More > against them necessarily complex. This book provides an overview of network security and covers some of the test methodologies used to assess the effectiveness and performance impact of IPS/IDS, UTMs, and a new generation firewalls using attacks such as DoS/DDoS, as well as known vulnerabilities and malware. The last section of the book is dedicated on IPsec VPN test methodologies.< Less
•Design and Evaluation of Network Survivability Schemes for Correlated Multi-Failure Scenarios By Oscar Diaz
Hardcover: $19.38
Ships in 6-8 business days.
Computer network recovery from multiple correlated failures is a major concern given the increased level of infrastructure vulnerability to natural disasters, massive power failures, and malicious... More > attacks. In many cases, existing network recovery schemes cannot handle such scenarios as they are mostly designed for isolated single node and link failures. Hence in order to properly address this concern, improved network recovery schemes are needed based upon probabilistic failure models. This work presents some novel path protection algorithms along these lines to help minimize failure probabilities and also take into account well-known traffic engineering concerns. Network simulation is also used to evaluate the proposed solutions.< Less
Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology By Subcommittee on Oversight and Investigations of the Committee on Foreign Affairs House of Representatives
eBook (ePub): $8.99
Download immediately.
The United States is under attack. Cyber-attack and cyber-espionage traced backed to China have been dramatically increasing every year. What kind of damage is being done? How is our national... More > security being compromised? The Office of the Secretary of Defense in their 2010 annual report to Congress, which was the "Military and Security Developments Involving the People's Republic of China [PRC]"; outlined this challenge: "The PRC utilizes a large well-organized network of enterprises, defense factories and affiliated research institutes and computer network operations to facilitate the collection of sensitive information and export-controlled technology." The heavy use of outsourcing of computer and consumer electronic production to China, not only by American but also by Japanese, Taiwanese, German, and South Korean firms, has helped create a Chinese cyber threat that now compromises the security of the Western world.< Less
The Corliss Group Latest Tech Review: Facebook to Launch Social Network for Cyber Security Experts By Grace Wilson
eBook (PDF): $8.99
Download immediately.
Facebook is launching a social network for cyber security professionals to share information about threats that could lead to cyber attacks, as the US government and companies search for new ways to... More > co-ordinate their defences. The world’s largest social network is stepping up its work in cyber security by teaming with other technology companies including Yahoo and online scrapbooking site Pinterest. The platform will enable companies to share clues about how hackers are behaving in the hope of preventing security breaches. As cyber attacks hit companies from Sony Pictures to health insurer Anthem, the private and public sector are under pressure to work together to understand their adversaries. Hackers join forces and share tips to break into networks but so far, communication about cyber defence has often been haphazard.< Less
Cyber Styletto By Gian DeTorre and Mike Brennan
Paperback: $9.99
Ships in 3-5 business days
Super hacker Yvonne Tran, part of a secret government agency called CyberCom, is brought in to investigate a malicious network attack that caused the deaths of eight innocent people. She and her team... More > follow the trail to Hong Kong and Afghanistan, and they must pinpoint the source before the next attack, which has the potential to kill hundreds of US citizens.< Less
Open Source for You, July 2015 By EFY Enterprises Pvt Ltd
eBook (PDF): $1.23
Download immediately.
Here is the latest issue of OpenSource For You to let you know about the latest in the network monitoring. It will not only help you find out the lightweight system monitoring tools but also will... More > give you an overview about the distributed networks and about Nagios Core. It will also guide you to select the right multi-functional printers, to know about the wireless attacks, to find out the open source ERP system for entrepreneurs,etc.< Less