Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200541 a 4500 
001    172622818 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr unu|||||||| 
008    070917s2007    nju     ob    001 0 eng d 
019    1005463246 
020    9780321336323 
020    0321336321 
020    9780132702058 
020    0132702053 
024 3  9780321336323 
029 1  AU@|b000067094914 
029 1  DEBSZ|b35540382X 
029 1  HEBIS|b291476635 
035    (OCoLC)172622818|z(OCoLC)1005463246 
037    CL0500000013|bSafari Books Online 
040    UMI|beng|epn|cUMI|dOCLCQ|dTXJ|dCEF|dOCLCQ|dNHM|dDEBSZ
       |dOCLCQ|dOCLCO|dOCLCF|dOCLCQ|dYDX|dOCLCA|dOCLCQ|dAU@
       |dOCLCQ|dUAB|dCNCEN|dOCLCQ|dOCLCO|dOCLCQ|dOCLCO|dOCLCL 
049    INap 
082 04 005.8 
082 04 005.8|qOCoLC|222/eng/20230216 
099    eBook O’Reilly for Public Libraries 
100 1  Provos, Niels. 
245 10 Virtual honeypots :|bfrom botnet tracking to intrusion 
       detection /|cNiels Provos, Thorsten Holz.|h[O'Reilly 
       electronic resource] 
260    Upper Saddle River, N.J. :|bAddison-Wesley,|c2007. 
300    1 online resource 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
504    Includes bibliographical references and index. 
505 0  1. Honeypot and networking background -- 2. High-
       interaction honeypots -- 3. Low-interaction honeypots -- 
       4. Honeyd -- the basics -- 5. Honeyd -- advanced topics --
       6. Collecting malware with honeypots -- 7. Hybrid systems 
       -- 8. Client honeypots -- 9. Detecting honeypots -- 10. 
       Case studies -- 11. Tracking botnets -- 12. Analyzing 
       malware with CWSandbox. 
520 1  "In this hands-on, highly accessible book, two leading 
       honeypot pioneers systematically introduce virtual 
       honeypot technology. One step at a time, you'll learn 
       exactly how to implement, configure, use, and maintain 
       virtual honeypots in your own environment, even if you've 
       never deployed a honeypot before." "You'll learn through 
       examples, including Honeyd, the acclaimed virtual honeypot
       created by coauthor Niels Provos. The authors also present
       multiple real-world applications for virtual honeypots, 
       including network decoy, worm detection, spam prevention, 
       and network simulation."--Jacket 
588 0  Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Computer security. 
650  6 Sécurité informatique. 
650  7 Computer security.|2blmlsh 
650  7 Computer security|2fast 
700 1  Holz, Thorsten. 
776 08 |iPrint version:|aProvos, Niels.|tVirtual honeypots.
       |dUpper Saddle River, N.J. : Addison-Wesley, 2007
       |z0321336321|z9780321336323|w(DLC)  2007020022
       |w(OCoLC)128237865 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9780321336323/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    YBP Library Services|bYANK|n14858126 
994    92|bJFN