download
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Honeypots for Windows

46,99 €*

ISBN-13:
9781430200079
Veröffentl:
2006
Seiten:
424
Autor:
Roger A. Grimes
eBook Typ:
PDF
eBook Format:
EPUB
Kopierschutz:
1 - PDF Watermark
Sprache:
Englisch
Beschreibung:
* Talks about hardening a Windows host before deploying Honeypot
"The Book will cover installing, configuring, and maintaining security Honeypots on Windows platforms. The Book will specifically cover the popular open source Honeypot product called honeyd, and summarize other commercial Honeypot solutions. There are no computer security books covering Honeypots (or IDSs) as they run on Windows platforms.Developers who are tired of reading Unix and Linux documentation and newsgroups to get information on how to build and maintain a Windows-based Honeypot this book is for you. No longer will you have to rummage through Unix-only advice and utilities to pull out the information that related to your Windows deployment. No longer will you have to listen to some Unix head bash Microsoft and Bill Gates when all you wanted to know is why your Honeypot wasn't working. Learn special tricks and troubleshooting hints to run a Windows-based Honeypot.Target audience: Windows network and security administrators; intrusion detection software users; subscribers to Honeypot mailing list; readers of other author's Honeypot books - all are very Unix-centric TOC:Foreword.- Introduction.- Why Honeypots.- Honeypot Deployment Methodology.- Installation.- Configuration.- Monitoring, Logging, and Reporting.- Service Scripts.- Analyzing Honeypot Data.- Special Considerations of Using Honeypots on Windows.- Using with Snort.- Advanced Topics.- Overview of Other Windows-based Honeypots.- Appendix: Honeypot Resources."
Honeypots in General.- An Introduction to Honeypots.- A Honeypot Deployment Plan.- Windows Honeypots.- Windows Honeypot Modeling.- Windows Honeypot Deployment.- Honeyd Installation.- Honeyd Configuration.- Honeyd Service Scripts.- Other Windows-Based Honeypots.- Honeypot Operations.- Network Traffic Analysis.- Honeypot Monitoring.- Honeypot Data Analysis.- Malware Code Analysis.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.