Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Honeypots: Tracking Hackers

Buy
Honeypots: Tracking Hackers, 9780321108951 (0321108957), Addison Wesley, 2002

"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute

"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture of the hacker in action."
--From the Foreword by Marcus J. Ranum

"From the basics of shrink-wrapped honeypots that catch script kiddies to the detailed architectures of next-generation honeynets for trapping more sophisticated bad guys, this book covers it all....This book really delivers new information and insight about one of the most compelling information security technologies today."
--Ed Skoudis, author of Counter Hack, SANS instructor, and Vice President of Security Strategy for Predictive Systems

Honeypots are unique technological systems specifically designed to be probed, attacked, or compromised by an online attacker. Implementing a honeypot provides you with an unprecedented ability to take the offensive against hackers. Whether used as simple "burglar alarms," incident response systems, or tools for gathering information about hacker motives and tactics, honeypots can add serious firepower to your security arsenal.

Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. The book starts with a basic examination of honeypots and the different roles they can play, and then moves on to in-depth explorations of six specific kinds of real-world honeypots: BackOfficer Friendly, Specter™, Honeyd, Homemade honeypots, ManTrap®, and Honeynets.

Honeypots also includes a chapter dedicated to legal issues surrounding honeypot use. Written with the guidance of three legal experts, this section explores issues of privacy, entrapment, and liability. The book also provides an overview of the Fourth Amendment, the Electronic Communications Privacy Act, the Wiretap Act, and the Pen/Trap Statute, with an emphasis on how each applies to honeypots.

With this book you will gain an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment. You will arm yourself with the expertise needed to track attackers and learn about them on your own. Security professionals, researchers, law enforcement agents, and members of the intelligence and military communities will find this book indispensable.

The CD-ROM contains white papers, source code, and data captures of real attacks. Its contents will help you build and deploy your own honeypot solutions and analyze real attacks.

About the Author

Lance Spitzner is a senior security architect for Sun Microsystems, Inc., and an acknowledged authority in security and honeypot research. He is a developer, the moderator of the honeypots mailing list, and an instructor for the SANS honeypot course. He is also the founder of the Honeynet Project, a nonprofit group of thirty security professionals dedicated to Honeynet research and learning the tools, tactics, and motives of blackhats and sharing their lessons learned. Lance has presented data on honeypot technologies to organizations such as the Pentagon, the FBI Academy, the Naval War College, the National Security Agency, West Point, SANS, CanSecWest, and Black Hat Briefings.

(HTML tags aren't allowed.)

Pro .NET 4 Parallel Programming in C# (Expert's Voice in .NET)
Pro .NET 4 Parallel Programming in C# (Expert's Voice in .NET)

Parallel programming has been revolutionised in .NET 4 providing, for the first time, a standardised and simplified method for creating robust, scalable and reliable multi-threaded applications. The Parallel Programming features of .NET 4 allow the programmer to create applications that harness the power of multi-core and multi-processor...

Pragmatic Version Control Using Git (Pragmatic Starter Kit)
Pragmatic Version Control Using Git (Pragmatic Starter Kit)
Whether you're making the switch from a traditional centralized version control system or are a new programmer just getting started, this book prepares you to start using Git in your everyday programming.

Pragmatic Version Control Using Git starts with an overview of version control systems, and shows how being distributed enables...

Principles of Communications Networks and Systems
Principles of Communications Networks and Systems

This book addresses the fundamentals of communications systems and networks, providing models and analytical methods for evaluating their performance. It is divided into ten chapters, which are the result of a joint effort by the authors and contributors. The authors and the contributors have a long history of collaboration, both in...


MCITP Self-Paced Training Kit (Exam 70-647): Windows Server Enterprise Administration
MCITP Self-Paced Training Kit (Exam 70-647): Windows Server Enterprise Administration
Announcing an all-new SELF-PACED TRAINING KIT designed to help maximize your performance on 70-647, a required exam for the new Microsoft® Certified IT Professional (MCITP): Enterprise Administrator certification. This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on CD to help assess your skills. It comes...
Bob Miller's Calc for the Clueless: Calc I (Bob Miller's Clueless Series)
Bob Miller's Calc for the Clueless: Calc I (Bob Miller's Clueless Series)

Student tested and approved!

If you suffer from math anxiety, then sign up for private tutoring with Bob Miller! Do logarithms, sines, and cosines leave you in a cold sweat? Vectors and derivatives send stress signals to your brain? If so, then you are like the many thousands of students­­students of all ages,...

Oracle Database 11g The Complete Reference (Osborne ORACLE Press Series)
Oracle Database 11g The Complete Reference (Osborne ORACLE Press Series)
Oracle Database 11g is a significant upgrade from prior releases of Oracle. New features give developers, database administrators, and end users greater control over the storage, processing, and retrieval of their data. In this chapter, you will see highlights of the Oracle Database 11g architecture. You will see detailed discussions of new...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy