Normal view MARC view ISBD view

Honeypots for Windows / Roger A. Grimes.

By: Grimes, Roger A.
Material type: TextTextSeries: Springer.Publisher: Berkeley, CA : New York : Apress ; Distributed in the United States by Springer-Verlag, c2005Description: 1 online resource (xxv, 392 p.) : ill.ISBN: 9781430200079; 1430200073.Subject(s): Microsoft Windows (Computer file) | Computer securityAdditional physical formats: Print version:: Honeypots for Windows.LOC classification: QA76.9.A25 | G77 2005Online resources: Click here to view this ebook.
Contents:
An introduction to honeypots -- A honeypot deployment plan -- Windows honeypot modeling -- Windows honeypot deployment -- Honeyd installation -- Honeyd configuration -- Honeyd service scripts -- Other Windows-based honeypots -- Network traffic analysis -- Honeypot monitoring -- Honeypot data analysis -- Malware code analysis.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.9.A25 G77 2005 (Browse shelf) http://ezproxy.uttyler.edu:2048/login?url=http://dx.doi.org/10.1007/978-1-4302-0007-9 Available ocn262680137
Browsing UT Tyler Online Shelves , Shelving location: Online Close shelf browser
QA76.9.A25 F77 2006 Fast software encryption : QA76.9.A25 F77 2007 Fast software encryption : QA76.9.A25 F87 2005 Computer insecurity : QA76.9.A25 G77 2005 Honeypots for Windows / QA76.9.A25 H377 2006 Hardening Windows / QA76.9.A25 H84 2006 Hop integrity in the Internet / QA76.9.A25 H97 2007 Critical information infrastructures :

Includes bibliographical references and index.

An introduction to honeypots -- A honeypot deployment plan -- Windows honeypot modeling -- Windows honeypot deployment -- Honeyd installation -- Honeyd configuration -- Honeyd service scripts -- Other Windows-based honeypots -- Network traffic analysis -- Honeypot monitoring -- Honeypot data analysis -- Malware code analysis.

Description based on print version record.

Author notes provided by Syndetics

Roger A. Grimes (CPA, CISSP, MCSE: Security (NT/2000/2003/MVP), CEH, TICSA, Security+, MCT) is a Windows security consultant, instructor, and author. This is Grimes' third book and he has written over a 150 articles for magazines like Windows IT Pro, Microsoft Certified Professional, InfoWorld, Network Magazine, Windows & .NET, and Security Administrator. He is a contributing editor for Windows & .NET, and InfoWorld magazines. Grimes has presented at Windows Connections, MCP TechMentors, and SANS. He was recognized as "Most Valuable Professional" (MVP) by Microsoft, for Windows Server 2003 security. Grimes also writes frequently for Microsoft, including material for two courses on advanced Windows security and Technet. He has taught security to many of the world's largest and most respected organizations, including Microsoft, VeriSign, the U.S. Navy, various universities, and public school systems. Grimes spends his time surrounded by the maddening hum of twelve 1U servers in his home office, monitoring his personal honeypots.

There are no comments for this item.

Log in to your account to post a comment.