Detection of Intrusions and Malware, and Vulnerability Assessment [electronic resource] : 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings /
Material type: TextSeries: Security and Cryptology ; 6201Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010Edition: 1st ed. 2010Description: XII, 219 p. 55 illus. online resourceContent type:- text
- computer
- online resource
- 9783642142154
- Computer networks
- Cryptography
- Data encryption (Computer science)
- Electronic data processing -- Management
- Computers and civilization
- Application software
- Algorithms
- Computer Communication Networks
- Cryptology
- IT Operations
- Computers and Society
- Computer and Information Systems Applications
- Algorithms
- 004.6 23
- TK5105.5-5105.9
Host Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis – Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS – Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks.
There are no comments on this title.