Craig Schiller (CISO for Portland State University and President of Hawkeye Security Training, LLC), James R. Binkley (T
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with...
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real w...