Honeypots: Tracking Hackers

作者: L. Spitzner

DOI:

关键词:

摘要: "The text is comprehensive, an honest survey of every honeypot technology I had ever heard and a number read about for the first time." --Stephen Northcutt, The SANS Institute"One great byproducts Lance's work with honeypots honeynets that he's helped give us much clearer picture hacker in action." --From Foreword by Marcus J. Ranum"From basics shrink-wrapped catch script kiddies to detailed architectures next-generation trapping more sophisticated bad guys, this book covers it all....This really delivers new information insight one most compelling security technologies today." --Ed Skoudis, author Counter Hack, instructor, Vice President Security Strategy Predictive SystemsHoneypots are unique technological systems specifically designed be probed, attacked, or compromised online attacker. Implementing provides you unprecedented ability take offensive against hackers. Whether used as simple "burglar alarms," incident response systems, tools gathering motives tactics, can add serious firepower your arsenal.Honeypots: Tracking Hackers ultimate guide rapidly growing, cutting-edge technology. starts basic examination different roles they play, then moves on in-depth explorations six specific kinds real-world honeypots: BackOfficer Friendly, Specter™, Honeyd, Homemade honeypots, ManTrap®, Honeynets.Honeypots also includes chapter dedicated legal issues surrounding use. Written guidance three experts, section explores privacy, entrapment, liability. overview Fourth Amendment, Electronic Communications Privacy Act, Wiretap Pen/Trap Statute, emphasis how each applies honeypots.With will gain understanding concepts architecture, well skills deploy best solutions environment. You arm yourself expertise needed track attackers learn them own. professionals, researchers, law enforcement agents, members intelligence military communities find indispensable.The CD-ROM contains white papers, source code, data captures real attacks. Its contents help build own analyze 0321108957B08282002

参考文章(13)
C. Stoll, The Cuckoo's Egg ,(1989)
Bernd Lehle, Oliver Reutter, ssh - Secure Shell ,(1997) , 10.18419/OPUS-5733
J. Postel, Simple Mail Transfer Protocol RFC821. ,vol. 788, pp. 1- 64 ,(1981)
J. Postel, J. K. Reynolds, File Transfer Protocol File Transfer Protocol. ,vol. 959, pp. 1- 69 ,(1985)
Richard Pates, Times have changed Journal of Substance Use. ,vol. 7, pp. 1- 2 ,(2002) , 10.1080/14659890110110652
Tony Ross, The Boy Who Cried Wolf ,(1985)
Bruce Caldwell, The goal is to learn Music Educators Journal. ,vol. 70, pp. 30- 30 ,(1983) , 10.1177/002743218307000205
Anthony H. Handal, H. Donald Wilson, Gary Marple, Edwin R. Addison, Nancy Krebs, Text to speech ,(2003)