Overview
- First book on Botnets — the #1 security threat
- Includes Botnet detection techniques and response strategies
- Latest results from leading academic, industry and government experts in security
- Includes supplementary material: sn.pub/extras
Part of the book series: Advances in Information Security (ADIS)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (8 chapters)
Keywords
About this book
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat.
Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based on the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets. It provides botnet detection techniques and response strategies, as well as the latest results from leading academic, industry and government researchers.
Botnet Detection: Countering the Largest Security Threat is intended for researchers and practitioners in industry. This book is also appropriate as a secondary text or reference book for advanced-level students in computer science.
Editors and Affiliations
Bibliographic Information
Book Title: Botnet Detection
Book Subtitle: Countering the Largest Security Threat
Editors: Wenke Lee, Cliff Wang, David Dagon
Series Title: Advances in Information Security
DOI: https://doi.org/10.1007/978-0-387-68768-1
Publisher: Springer New York, NY
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag US 2008
Hardcover ISBN: 978-0-387-68766-7Published: 29 November 2007
Softcover ISBN: 978-1-4419-4330-9Published: 25 November 2010
eBook ISBN: 978-0-387-68768-1Published: 23 October 2007
Series ISSN: 1568-2633
Series E-ISSN: 2512-2193
Edition Number: 1
Number of Pages: XII, 168
Topics: Systems and Data Security, Computer Communication Networks, Cryptology, Information Systems Applications (incl. Internet), Data Structures and Information Theory, Computer Systems Organization and Communication Networks