16 126 809 książek w 175 językach
Jednak się nie przyda? Nic nie szkodzi! U nas możesz zwrócić towar do 30 dni
Bon prezentowy to zawsze dobry pomysł. Obdarowany może za bon prezentowy wybrać cokolwiek z naszej oferty.
30 dni na zwrot towaru
The growth of network and Internet technologies has brought a paradigm shift the way data and information transfer takes place in network. With real data & information, some unwarranted programs may also enter into our network system without our knowledge.These unwarranted programs are called malware.They pose a major security challenges to legitimate users. Therefore it is very important to study their propagation dynamics & detection mechanism to fight against them and find an optimal defence solution to cover a wide spectrum of malware.Towards this goal this book studies worm propagation modelling,worm detection and worm containment.The propagation modelling will help in analysing malicious traffic and their characteristics, which in turn helps in building necessary defence mechanism to thwart an malicious attack. A hybrid approach of detection,combining both, signature-based and anomaly-based detection adopted in this book gives the advantage of both techniques in automated signature generation of zero-day worms.This study will help any individual or organization that is interested in a comprehensive cyber defence solution to protect their digital resources from malware attack.