* Talks about hardening a Windows host before deploying Honeypot

* Covers how to create your own emulated services to fool hackers

* Discusses physical setup of Honeypot and network necessary to draw hackers ...

Buy Now From Amazon

* Talks about hardening a Windows host before deploying Honeypot

* Covers how to create your own emulated services to fool hackers

* Discusses physical setup of Honeypot and network necessary to draw hackers to Honeypot

* Discusses how to use Snort to co-exist with Honeypot

* Discusses how to use a Unix-style Honeypot to mimic a Windows host

* Discusses how to fine-tune a Honeypot

* Discusses OS fingerprinting, ARP tricks, packet sniffing, and exploit signatures



  • Used Book in Good Condition
  • Used Book in Good Condition

Similar Products

Honeypots: Tracking HackersThe Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac MemoryKnow Your Enemy: Learning about Security Threats (2nd Edition)Incident Response & Computer Forensics, Third EditionRootkits: Subverting the Windows KernelThe Tao of Network Security Monitoring: Beyond Intrusion DetectionReversing: Secrets of Reverse Engineering