O'Reilly logo

Web Hacking: Attacks and Defense by Shreeraj Shah, Saumil Shah, Stuart McClure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 17. Beating the IDS

 

The B-2's stealth characteristics give it the unique ability to penetrate an enemy's most sophisticated defenses and threaten its most valued and heavily defended targets.

 
 --USAF fact sheet on the B-2 bomber

Introduction

In modern warfare, attacks occur in a very short period of time. The ability to thwart and repel an attack depends greatly on how early it can be detected. Radar, satellites, and other monitoring and surveillance systems are regularly used to detect any hostile activity. However, even in warfare, intrusion detection isn't 100% accurate. The Iraqis used cardboard mock-up models of Soviet T-72 tanks, which were detected by satellite photography and led the allied forces to think that they were real tanks. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required