Honeypots for Windows

Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for help. But Honeypots for Windows is a forensic j...

Full description

Bibliographic Details
Main Author: Grimes, Roger A.
Format: eBook
Language:English
Published: Berkeley, CA Apress 2005, 2005
Edition:1st ed. 2005
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02085nmm a2200301 u 4500
001 EB000360276
003 EBX01000000000000000213328
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9781430200079 
100 1 |a Grimes, Roger A. 
245 0 0 |a Honeypots for Windows  |h Elektronische Ressource  |c by Roger A. Grimes 
250 |a 1st ed. 2005 
260 |a Berkeley, CA  |b Apress  |c 2005, 2005 
300 |a 424 p  |b online resource 
505 0 |a Honeypots in General -- An Introduction to Honeypots -- A Honeypot Deployment Plan -- Windows Honeypots -- Windows Honeypot Modeling -- Windows Honeypot Deployment -- Honeyd Installation -- Honeyd Configuration -- Honeyd Service Scripts -- Other Windows-Based Honeypots -- Honeypot Operations -- Network Traffic Analysis -- Honeypot Monitoring -- Honeypot Data Analysis -- Malware Code Analysis 
653 |a Microsoft software 
653 |a Software engineering 
653 |a Microsoft 
653 |a Software Engineering 
653 |a Microsoft .NET Framework 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
028 5 0 |a 10.1007/978-1-4302-0007-9 
856 4 0 |u https://doi.org/10.1007/978-1-4302-0007-9?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.268 
520 |a Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for help. But Honeypots for Windows is a forensic journeyhelping you set up the physical layer, design your honeypot, and perform malware code analysis. You'll discover which Windows ports need to be open on your honeypot to fool those malicious hackers, and you'll learn about numerous open source tools imported from the Unix world. Install a honeypot on your DMZ or at home and watch the exploits roll in! Your honeypot will capture waves of automated exploits, and youll learn how to defend the computer assets under your control