000 01851nam a2200313 a 4500
999 _c12093
_d12093
003 AR-sfUTN
008 170717s2003 ||||| |||| 00| 0 eng d
020 _a0321108957
040 _cAR-sfUTN
041 _aeng
080 _a004.056 SP49
_22000
100 1 _aSpitzner, Lance
_910872
245 1 0 _aHoneypots :
_btracking hackers /
_cLance Spitzner.
260 _aBoston :
_bAddison-Wesley,
_c2003
300 _a452 p.
336 _2rdacontent
_atexto
_btxt
337 _2rdamedia
_asin mediaciĆ³n
_bn
338 _2rdacarrier
_avolumen
_bnc
500 _aIncluye 1 CD Rom. This book has a web site dedicated to it. The purpose of the web site is to keep this material updated. http://www.tracking-hackers.com/book (visited 23/03/07)
505 8 0 _aCONTENIDO Foreword: Giving the Hackers a Kick Where It Hurts Preface Ch. 1 The Sting: My Fascination with Honeypots 1 Ch. 2 The Threat: Tools, Tactics, and Motives of Attackers 11 Ch. 3 History and Definition of Honeypots 33 Ch. 4 The Value of Honeypots 49 Ch. 5 Classifying Honeypots by Level of Interaction 73 Ch. 6 BackOfficer Friendly 87 Ch. 7 Specter 109 Ch. 8 Honeyd 141 Ch. 9 Homemade Honeypots 167 Ch. 10 Man Trap 193 Ch. 11 Honeynets 229 Ch. 12 Implementing Your Honeypot 277 Ch. 13 Maintaining Your Honeypot 309 Ch. 14 Putting It All Together 341 Ch. 15 Legal Issues 367 Ch. 16 Future of Honeypots 387 App. A BackOfficer Friendly ASCII File of Scans 399 App. B Snort Configuration File 407 App. C IP Protocols 411 App. D Definitions, Requirements, and Standards Document 415 App. E Honeynet Logs 423 Index 429
650 _aCOMPUTER SECURITY
650 _aCOMPUTER HACKERS
650 _aFIREWALLS
650 _aHONEYPOTS
650 _aSEGURIDAD INFORMATICA
942 _cBK
_2udc