|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn172622818 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
070917s2007 nju ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d TXJ
|d CEF
|d OCLCQ
|d NHM
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d YDX
|d OCLCA
|d OCLCQ
|d AU@
|d OCLCQ
|d UAB
|d CNCEN
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1005463246
|
020 |
|
|
|a 9780321336323
|
020 |
|
|
|a 0321336321
|
020 |
|
|
|a 9780132702058
|
020 |
|
|
|a 0132702053
|
024 |
3 |
|
|a 9780321336323
|
029 |
1 |
|
|a AU@
|b 000067094914
|
029 |
1 |
|
|a DEBSZ
|b 35540382X
|
029 |
1 |
|
|a HEBIS
|b 291476635
|
035 |
|
|
|a (OCoLC)172622818
|z (OCoLC)1005463246
|
037 |
|
|
|a CL0500000013
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b P785 2007
|
082 |
0 |
4 |
|a 005.8
|q OCoLC
|2 22/eng/20230216
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Provos, Niels.
|
245 |
1 |
0 |
|a Virtual honeypots :
|b from botnet tracking to intrusion detection /
|c Niels Provos, Thorsten Holz.
|
260 |
|
|
|a Upper Saddle River, N.J. :
|b Addison-Wesley,
|c 2007.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a 1. Honeypot and networking background -- 2. High-interaction honeypots -- 3. Low-interaction honeypots -- 4. Honeyd -- the basics -- 5. Honeyd -- advanced topics -- 6. Collecting malware with honeypots -- 7. Hybrid systems -- 8. Client honeypots -- 9. Detecting honeypots -- 10. Case studies -- 11. Tracking botnets -- 12. Analyzing malware with CWSandbox.
|
520 |
1 |
|
|a "In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you'll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you've never deployed a honeypot before." "You'll learn through examples, including Honeyd, the acclaimed virtual honeypot created by coauthor Niels Provos. The authors also present multiple real-world applications for virtual honeypots, including network decoy, worm detection, spam prevention, and network simulation."--Jacket
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Holz, Thorsten.
|
776 |
0 |
8 |
|i Print version:
|a Provos, Niels.
|t Virtual honeypots.
|d Upper Saddle River, N.J. : Addison-Wesley, 2007
|z 0321336321
|z 9780321336323
|w (DLC) 2007020022
|w (OCoLC)128237865
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780321336323/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14858126
|
994 |
|
|
|a 92
|b IZTAP
|