Cargando…

Virtual honeypots : from botnet tracking to intrusion detection /

"In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you'll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you've never deploy...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Provos, Niels
Otros Autores: Holz, Thorsten
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, N.J. : Addison-Wesley, 2007.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn172622818
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 070917s2007 nju ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCQ  |d TXJ  |d CEF  |d OCLCQ  |d NHM  |d DEBSZ  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d YDX  |d OCLCA  |d OCLCQ  |d AU@  |d OCLCQ  |d UAB  |d CNCEN  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1005463246 
020 |a 9780321336323 
020 |a 0321336321 
020 |a 9780132702058 
020 |a 0132702053 
024 3 |a 9780321336323 
029 1 |a AU@  |b 000067094914 
029 1 |a DEBSZ  |b 35540382X 
029 1 |a HEBIS  |b 291476635 
035 |a (OCoLC)172622818  |z (OCoLC)1005463246 
037 |a CL0500000013  |b Safari Books Online 
050 4 |a QA76.9.A25  |b P785 2007 
082 0 4 |a 005.8  |q OCoLC  |2 22/eng/20230216 
049 |a UAMI 
100 1 |a Provos, Niels. 
245 1 0 |a Virtual honeypots :  |b from botnet tracking to intrusion detection /  |c Niels Provos, Thorsten Holz. 
260 |a Upper Saddle River, N.J. :  |b Addison-Wesley,  |c 2007. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a 1. Honeypot and networking background -- 2. High-interaction honeypots -- 3. Low-interaction honeypots -- 4. Honeyd -- the basics -- 5. Honeyd -- advanced topics -- 6. Collecting malware with honeypots -- 7. Hybrid systems -- 8. Client honeypots -- 9. Detecting honeypots -- 10. Case studies -- 11. Tracking botnets -- 12. Analyzing malware with CWSandbox. 
520 1 |a "In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you'll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you've never deployed a honeypot before." "You'll learn through examples, including Honeyd, the acclaimed virtual honeypot created by coauthor Niels Provos. The authors also present multiple real-world applications for virtual honeypots, including network decoy, worm detection, spam prevention, and network simulation."--Jacket 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Computer security  |2 fast 
700 1 |a Holz, Thorsten. 
776 0 8 |i Print version:  |a Provos, Niels.  |t Virtual honeypots.  |d Upper Saddle River, N.J. : Addison-Wesley, 2007  |z 0321336321  |z 9780321336323  |w (DLC) 2007020022  |w (OCoLC)128237865 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780321336323/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 14858126 
994 |a 92  |b IZTAP