Description |
1 online resource |
Bibliography |
Includes bibliographical references and index. |
Contents |
1. Honeypot and networking background -- 2. High-interaction honeypots -- 3. Low-interaction honeypots -- 4. Honeyd -- the basics -- 5. Honeyd -- advanced topics -- 6. Collecting malware with honeypots -- 7. Hybrid systems -- 8. Client honeypots -- 9. Detecting honeypots -- 10. Case studies -- 11. Tracking botnets -- 12. Analyzing malware with CWSandbox. |
Summary |
"In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you'll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you've never deployed a honeypot before." "You'll learn through examples, including Honeyd, the acclaimed virtual honeypot created by coauthor Niels Provos. The authors also present multiple real-world applications for virtual honeypots, including network decoy, worm detection, spam prevention, and network simulation."--Jacket |
Subject |
Computer security.
|
|
Sécurité informatique. |
|
Computer security. |
|
Computer security |
Added Author |
Holz, Thorsten.
|
Other Form: |
Print version: Provos, Niels. Virtual honeypots. Upper Saddle River, N.J. : Addison-Wesley, 2007 0321336321 9780321336323 (DLC) 2007020022 (OCoLC)128237865 |
ISBN |
9780321336323 |
|
0321336321 |
|
9780132702058 |
|
0132702053 |
Standard No. |
9780321336323 |
|