IDSes, Firewalls, and Honeypots
Autor: | Sagar Ajay Rahalkar |
---|---|
Rok vydání: | 2016 |
Předmět: | |
Zdroj: | Certified Ethical Hacker (CEH) Foundation Guide ISBN: 9781484223246 |
DOI: | 10.1007/978-1-4842-2325-3_13 |
Popis: | Routers, switches, and hubs are some of the networking devices used to establish connectivity among networked devices. However, they don't provide much control over access and security. Securing the network requires special-purpose devices like intrusion detection systems, firewalls, and honeypots. This chapter introduces these devices, their types, and the architectural considerations for their placement in the network. |
Databáze: | OpenAIRE |
Externí odkaz: |