* Covers how to create your own emulated services to fool hackers
* Discusses physical setup of Honeypot and network necessary to draw hackers to Honeypot
* Discusses how to use Snort to co-exist with Honeypot
* Discusses how to use a Unix-style Honeypot to mimic a Windows host
* Discusses how to fine-tune a Honeypot
* Discusses OS fingerprinting, ARP tricks, packet sniffing, and exploit signatures
"synopsis" may belong to another edition of this title.
"About this title" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantIf you know the book but cannot find it on AbeBooks, we can automatically search for it on your behalf as new inventory is added. If it is added to AbeBooks by one of our member booksellers, we will notify you!
Create a Want