by RogerA.Grimes (Author)
* Talks about hardening a Windows host before deploying Honeypot
* Covers how to create your own emulated services to fool hackers
* Discusses physical setup of Honeypot and network necessary to draw hackers to Honeypot
* Discusses how to use Snort to co-exist with Honeypot
* Discusses how to use a Unix-style Honeypot to mimic a Windows host
* Discusses how to fine-tune a Honeypot
* Discusses OS fingerprinting, ARP tricks, packet sniffing, and exploit signatures
Format: Illustrated
Pages: 424
Edition: 1st ed.
Publisher: Apress
Published: 16 Feb 2005
ISBN 10: 1590593359
ISBN 13: 9781590593356