Ensuring Network Security through the Use of the Honeypot Technique

Author:   Kuthadi Venu Madhav ,  Kuthadi Venu Madhav
Publisher:   Cambridge Scholars Publishing
Edition:   Unabridged edition
ISBN:  

9781527541436


Pages:   161
Publication Date:   12 December 2019
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $152.64 Quantity:  
Add to Cart

Share |

Ensuring Network Security through the Use of the Honeypot Technique


Add your own review!

Overview

In modern technology networks, security plays an important role in safeguarding data. Detecting the threats posed by hackers, and capturing the data about such attacks are known as the virtual honeypot. This book details the process, highlighting how to confuse the attackers and to direct them onto the wrong path.

Full Product Details

Author:   Kuthadi Venu Madhav ,  Kuthadi Venu Madhav
Publisher:   Cambridge Scholars Publishing
Imprint:   Cambridge Scholars Publishing
Edition:   Unabridged edition
ISBN:  

9781527541436


ISBN 10:   1527541436
Pages:   161
Publication Date:   12 December 2019
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Reviews

Author Information

Dr Rajalakshmi Selvaraj is a Senior Lecturer in the Department of Computer Science and Information Systems at the Botswana International University of Science and Technology. She holds a doctorate in Network Security, and has published 45 articles in various international journals and edited volumes.Dr Kuthadi Venu Madhav is a Professor in the Department of Computer Science and Information Systems at the Botswana International University of Science and Technology. His research focuses on the generation of a security pattern to safeguard data that is transmitted over a network by introducing an adaptive pre-processing technique using principal component analysis.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List