![]() Honeypots also includes a chapter dedicated to legal issues surrounding honeypot use. The book starts with a basic examination of honeypots and the different roles they can play, and then moves on to in-depth explorations of six specific kinds of real-world honeypots: BackOfficer Friendly, Specter ™, Honeyd, Homemade honeypots, ManTrap ®, and Honeynets. Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. Whether used as simple "burglar alarms," incident response systems, or tools for gathering information about hacker motives and tactics, honeypots can add serious firepower to your security arsenal. Implementing a honeypot provides you with an unprecedented ability to take the offensive against hackers. Honeypots are unique technological systems specifically designed to be probed, attacked, or compromised by an online attacker. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |