Sold Out
Book Categories |
Pt. 1 | Honeypots in general | |
Ch. 1 | An introduction to honeypots | 3 |
Ch. 2 | A honeypot deployment plan | 35 |
Pt. 2 | Windows honeypots | |
Ch. 3 | Windows honeypot modeling | 63 |
Ch. 4 | Windows honeypot deployment | 89 |
Ch. 5 | Honeyd installation | 121 |
Ch. 6 | Honeyd configuration | 151 |
Ch. 7 | Honeyd service scripts | 167 |
Ch. 8 | Other Windows-based honeypots | 189 |
Pt. 3 | Honeypot operations | |
Ch. 9 | Network traffic analysis | 223 |
Ch. 10 | Honeypot monitoring | 269 |
Ch. 11 | Honeypot data analysis | 301 |
Ch. 12 | Malware code analysis | 337 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionHoneypots for Windows
X
This Item is in Your InventoryHoneypots for Windows
X
You must be logged in to review the productsX
X
X
Add Honeypots for Windows, Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for he, Honeypots for Windows to the inventory that you are selling on WonderClubX
X
Add Honeypots for Windows, Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for he, Honeypots for Windows to your collection on WonderClub |