Книга: Hemant Kumar Saini and Satpal Singh Kushwaha «Protocol Discovery»

Protocol Discovery

Производитель: "LAP Lambert Academic Publishing"

Today with the tremendous series of undocumented or poorly documented protocols how an incident responder on the network can can present the packet by capturing a binary executable file. The contents of such files can be parsed by conventional static and dynamic techniques. In many situations one can t detect even the binary file for analysis. So a new process of Protocol Reverse Engineering (PRE) leveraging multiple sources of information to accelerate incident response detection. It is a pseudo-formal survey of the tools, techniques, and methodologies that I`ve experienced or observed to be effective that is deliberately proscriptive, rather than prescriptive. It is not an exhaustive study, and only designed to cover common needs of analysts - particularly engaged in incident response. ISBN:9783659627828

Издательство: "LAP Lambert Academic Publishing" (2014)

ISBN: 9783659627828

Другие книги схожей тематики:

АвторКнигаОписаниеГодЦенаТип книги
Wang YongjunGene Discovery for Disease ModelsThis book provides readers with new paradigms on the mutation discovery in the post-genome era. The completion of human and other genome sequencing, along with other new technologies, such as… — John Wiley&Sons Limited, электронная книга Подробнее...
11941.25электронная книга
Tobias S. BuckellHalo: The Cole ProtocolIn the first, desperate days of the Human-Covenant War, the UNSC has enacted the Cole Protocol to safeguard Earth and its Inner Colonies from discovery by a merciless alien foe. Many are called upon… — Tor, (формат: 110x175, 350 стр.) Подробнее...2009
849бумажная книга
Jack MoffittProfessional XMPP Programming with JavaScript and jQueryCreate real-time, highly interactive apps quickly with the powerful XMPP protocol XMPP is a robust protocol used for a wide range of applications, including instant messaging, multi-user chat, voice… — John Wiley&Sons Limited (USD), электронная книга Подробнее...
3577.17электронная книга
Zhuo XuDesigning and Implementing IP_MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLLA guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for convenience, simplicity, and flexible bandwidth… — John Wiley&Sons Limited, электронная книга Подробнее...
5463.32электронная книга
Bryan Harkins E.CWSP Certified Wireless Security Professional Study Guide. Exam CWSP-205The most detailed, comprehensive coverage of CWSP-205 exam objectives CWSP: Certified Wireless Security Professional Study Guide offers comprehensive preparation for the CWSP-205 exam. Fully updated… — John Wiley&Sons Limited (USD), электронная книга Подробнее...
4552.77электронная книга
Mike Lee S.Mass Spectrometry HandbookDue to its enormous sensitivity and ease of use, mass spectrometry has grown into the analytical tool of choice in most industries and areas of research. This unique reference provides an extensive… — John Wiley&Sons Limited, электронная книга Подробнее...
17166.53электронная книга
Schulzrinne HenningMobility Protocols and Handover Optimization. Design, Evaluation and ApplicationThis book provides a common framework for mobility management that considers the theoretical and practical aspects of systems optimization for mobile networks. In this book, the authors show how an… — John Wiley&Sons Limited, электронная книга Подробнее...
10068.11электронная книга
Clarisse DhaenensMetaheuristics for Big DataBig Data is a new field, with many technological challenges to be understood in order to use it to its full potential. These challenges arise at all stages of working with Big Data, beginning with… — John Wiley&Sons Limited, электронная книга Подробнее...
8108.47электронная книга

См. также в других словарях:

  • Protocol Independent Multicast — (PIM) is a family of multicast routing protocols that can provide one to many and many to many distribution of data over the Internet. The protocol independent part refers to the fact that PIM does not include its own topology discovery mechanism …   Wikipedia

  • Neighbor Discovery Protocol — The Neighbor Discovery Protocol (NDP) is a protocol in the Internet Protocol Suite used with Internet Protocol Version 6 (IPv6). It operates in the Link Layer of the Internet model (RFC 1122) and is responsible for address autoconfiguration of… …   Wikipedia

  • Link Layer Discovery Protocol — The Link Layer Discovery Protocol (LLDP) is a vendor neutral Link Layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on a IEEE 802 local area network, principally… …   Wikipedia

  • Nortel Discovery Protocol — The Nortel Discovery Protocol (NDP) is a Data Link Layer (OSI Layer 2) network protocol for discovery of Nortel (now acquired by Avaya and Ciena) devices. The device and topology information is graphically displayed by the Avaya Enterprise Switch …   Wikipedia

  • Point-to-Point Protocol over Ethernet — PPPoE, Point to Point Protocol over Ethernet, is a network protocol for encapsulating Point to Point Protocol (PPP) frames inside Ethernet frames. It is used mainly with ADSL services where individual users connect to the ADSL transceiver (modem) …   Wikipedia

  • Internet Control Message Protocol V6 — ICMPv6 (Internet Control Message Protocol Version 6) Familie: Internetprotokollfamilie Einsatzgebiet: Obligatorischer Zusatz zu IPv6, Fehlermeldungen, Diagnose, Autoconfiguration, Routing Internet Protokolle im TCP/IP Protokollstapel Internet… …   Deutsch Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»