L'édition de cet ISBN n'est malheureusement plus disponible.
Afficher les exemplaires de cette édition ISBNLes informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Frais de port :
EUR 3,69
Vers Etats-Unis
Description du livre Etat : New. N° de réf. du vendeur ABLIING23Mar3113020293951
Description du livre Etat : New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. N° de réf. du vendeur ria9783659578465_lsuk
Description du livre PAP. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L0-9783659578465
Description du livre PF. Etat : New. N° de réf. du vendeur 6666-IUK-9783659578465
Description du livre Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Port scanning, malicious hacking and the exploitation of web-based information systems' vulnerabilities remains a clear and potent danger to communication and transactions on the World Wide Web. The situation is further complicated by the ubiquitous nature of the Internet and the increasing volumes of private, organizational and institutional information repositories being migrated unto internet platforms. Malicious users sniffing private information engage in port scanning using automated tools hooked on proxy systems to intrude into unsuspecting hosts. A hybrid technique that offers resilient protection against port scanners is proposed. 108 pp. Englisch. N° de réf. du vendeur 9783659578465
Description du livre Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Port scanning, malicious hacking and the exploitation of web-based information systems' vulnerabilities remains a clear and potent danger to communication and transactions on the World Wide Web. The situation is further complicated by the ubiquitous nature of the Internet and the increasing volumes of private, organizational and institutional information repositories being migrated unto internet platforms. Malicious users sniffing private information engage in port scanning using automated tools hooked on proxy systems to intrude into unsuspecting hosts. A hybrid technique that offers resilient protection against port scanners is proposed. N° de réf. du vendeur 9783659578465
Description du livre PAP. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L0-9783659578465
Description du livre Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Yusuf Simon EnochSimon Enoch Yusuf holds BSc (Hons) degree and Master of Science degree (MSc) in Computer Science from Adamawa State University and University of Ibadan, Nigeria respectively. His research interest includes Cyber secu. N° de réf. du vendeur 5166127
Description du livre N° de réf. du vendeur STOCK12485140