## Abstract Presentβday network security mechanisms are based on preventing attacks and responding to them as they occur. In the time before a response is implemented the attack is generally free to damage the system. Because responses are usually human driven, this time is long and the damage can
β¦ LIBER β¦
Network infrastructure security
β Scribed by Lesley Hansen
- Publisher
- Elsevier Science
- Year
- 1997
- Tongue
- English
- Weight
- 628 KB
- Volume
- 1997
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Resilient infrastructure for network sec
β
Matthew M. Williamson
π
Article
π
2003
π
John Wiley and Sons
π
English
β 198 KB
Security implications of network infrast
β
Peter Wood
π
Article
π
1995
π
Elsevier Science
π
English
β 98 KB
Managing network security: Simulating ne
β
Fred Cohen
π
Article
π
1999
π
Elsevier Science
π
English
β 832 KB
Securing oil and gas infrastructure
β
S. Bajpai; J.P. Gupta
π
Article
π
2007
π
Elsevier Science
π
English
β 751 KB
Securing the Critical IP Infrastructure
β
Steven Branigan
π
Article
π
2002
π
Elsevier Science
π
English
β 192 KB
Safe and Secure Infrastructure Upgrades
β
Bruce Potter
π
Article
π
2005
π
Elsevier Science
π
English
β 70 KB
On the flip side, attackers are continually shrinking the time between the discovery of a vulnerability and the release of attacks that target that vulnerability. In 2001, the Nimda worm was released five months after the announcement of the vulnerability it exploited. In 2003, Blaster was released