LEADER 00000cam a2200541 a 4500 001 172622818 003 OCoLC 005 20240129213017.0 006 m o d 007 cr unu|||||||| 008 070917s2007 nju ob 001 0 eng d 019 1005463246 020 9780321336323 020 0321336321 020 9780132702058 020 0132702053 024 3 9780321336323 029 1 AU@|b000067094914 029 1 DEBSZ|b35540382X 029 1 HEBIS|b291476635 035 (OCoLC)172622818|z(OCoLC)1005463246 037 CL0500000013|bSafari Books Online 040 UMI|beng|epn|cUMI|dOCLCQ|dTXJ|dCEF|dOCLCQ|dNHM|dDEBSZ |dOCLCQ|dOCLCO|dOCLCF|dOCLCQ|dYDX|dOCLCA|dOCLCQ|dAU@ |dOCLCQ|dUAB|dCNCEN|dOCLCQ|dOCLCO|dOCLCQ|dOCLCO|dOCLCL 049 INap 082 04 005.8 082 04 005.8|qOCoLC|222/eng/20230216 099 eBook O’Reilly for Public Libraries 100 1 Provos, Niels. 245 10 Virtual honeypots :|bfrom botnet tracking to intrusion detection /|cNiels Provos, Thorsten Holz.|h[O'Reilly electronic resource] 260 Upper Saddle River, N.J. :|bAddison-Wesley,|c2007. 300 1 online resource 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 504 Includes bibliographical references and index. 505 0 1. Honeypot and networking background -- 2. High- interaction honeypots -- 3. Low-interaction honeypots -- 4. Honeyd -- the basics -- 5. Honeyd -- advanced topics -- 6. Collecting malware with honeypots -- 7. Hybrid systems -- 8. Client honeypots -- 9. Detecting honeypots -- 10. Case studies -- 11. Tracking botnets -- 12. Analyzing malware with CWSandbox. 520 1 "In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you'll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you've never deployed a honeypot before." "You'll learn through examples, including Honeyd, the acclaimed virtual honeypot created by coauthor Niels Provos. The authors also present multiple real-world applications for virtual honeypots, including network decoy, worm detection, spam prevention, and network simulation."--Jacket 588 0 Print version record. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Computer security. 650 6 Sécurité informatique. 650 7 Computer security.|2blmlsh 650 7 Computer security|2fast 700 1 Holz, Thorsten. 776 08 |iPrint version:|aProvos, Niels.|tVirtual honeypots. |dUpper Saddle River, N.J. : Addison-Wesley, 2007 |z0321336321|z9780321336323|w(DLC) 2007020022 |w(OCoLC)128237865 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9780321336323/?ar |zAvailable on O'Reilly for Public Libraries 938 YBP Library Services|bYANK|n14858126 994 92|bJFN