"Focusing exclusively on Internet worms, this book offers you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defence techniques utilizing data from live networks, real IP addresses and commercial tools. It helps you understand the classifications and groupings of worms, and offers a de ..."
""This book works in tandem with the OpenBSD's manual pages. As a result, it will help many users grow and get the most from the system."—Theo de Raadt, OpenBSD project leader. "The OpenBSD system intimidates many administrators who would benefit from using it. This book lets people start much higher up on the curve. Secure Architectures with OpenBSD not only presents the hows, but also shows some of the whys that only insiders know."—Mi ..."
"Shortly after the introduction of the Code Red worms and nipping at the heels of
Nimda, Ed Skoudis made several bold predictions for the growing storm of worms
[10]. These predictions were repeated again in July 2002 [11]. Several of these
predictions are now coming true. The first prediction he made was the use of zero
-day exploits and multiple vector attacks. Zero-day attacks typically exploit
vulnerabilities that are not widely ..."
"This unique, practical resource delivers specific Linux-based open source solutions to dozens of today's most common computing and business challenges. Each modular chapter covers all you need to know to solve a specific set of problems -- with extensive examples, and detailed guidance on acquiring and running the Linux-based open source software you'll need. Multitool Linux begins by reviewing the skills and mindset you need to make th ..."