LEADER 03445nmm a2200565 u 4500
001 EB002066707
003 EBX01000000000000001206797
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220922 ||| eng
020 |a 9781439869994 
020 |a 1439869995 
020 |a 0429061900 
050 4 |a QA76.9.A25 
100 1 |a Joshi, R. C. 
245 0 0 |a Honeypot  |b a new paradigm to information security  |c R.C. Joshi, Anjali Sardana 
260 |a Enfield, N.H.  |b Science Publishers  |c 2011 
300 |a xiv, 328 pages  |b illustrations 
505 0 |a Includes bibliographical references and index 
505 0 |a 1. Honeypots -- 2. Commercially available honeypots -- 3. Honeynets -- 4. Attacks and role of honeypots -- 5. Static honeypots -- 6. Virtual honeypots -- 7. Dynamic honeypots -- 8. Wireless honeypots -- 9. Applications of honeypots -- 10. Anti-honeypot technology -- 11. Honeypots and network forensics 
653 |a Computer security 
653 |a Firewalls (Computer security) / fast 
653 |a Coupe-feu (Sécurité informatique) 
653 |a COMPUTERS / Networking / Security / bisacsh 
653 |a Transmission sans fil / Sécurité / Mesures 
653 |a Hackers / fast 
653 |a Firewalls (Computer security) / http://id.loc.gov/authorities/subjects/sh00006011 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Wireless communication systems / Security measures / fast 
653 |a COMPUTERS / Security / General / bisacsh 
653 |a COMPUTERS / Internet / Security / bisacsh 
653 |a Pirates informatiques 
653 |a Sécurité informatique 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Computer networks / Security measures / fast 
653 |a Hackers / http://id.loc.gov/authorities/subjects/sh94005931 
653 |a Computer security / fast 
653 |a Wireless communication systems / Security measures 
700 1 |a Sardana, Anjali 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
028 5 0 |a 10.1201/b10738 
015 |a GBB7A9320 
776 |z 1578087082 
776 |z 9781578087082 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781578087082/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 384 
082 0 |a 005.8 
520 |a This book is written to give the reader a well-rounded understanding of honeypots in wired and wireless networks. It addresses honeypots from various perspectives. The book is exhaustive, systematic and user friendly. Case studies are given to enhance the practical understanding of the subject along with strong theoretical foundation. It includes the latest technology in Information Security, and Honeypots including honeytokens, honeynets and honeyfarms. It further discusses the role of honeypots in various attack scenarios like denial of service, virus, worms, phishing, etc. and elaborates on virtual honeypots and forensics. Practical implementations as well as current state of research has been discussed. The book is intended for anyone who as to administer, secure, hack, practice, understand or research on security technologies. It will serve both an academic and professional audience. Also meant for students doing a course in Honeypots in the disciplines Computer Science, Information Technology, Network Security, Information Science and Management