000 | 01851nam a2200313 a 4500 | ||
---|---|---|---|
999 |
_c12093 _d12093 |
||
003 | AR-sfUTN | ||
008 | 170717s2003 ||||| |||| 00| 0 eng d | ||
020 | _a0321108957 | ||
040 | _cAR-sfUTN | ||
041 | _aeng | ||
080 |
_a004.056 SP49 _22000 |
||
100 | 1 |
_aSpitzner, Lance _910872 |
|
245 | 1 | 0 |
_aHoneypots : _btracking hackers / _cLance Spitzner. |
260 |
_aBoston : _bAddison-Wesley, _c2003 |
||
300 | _a452 p. | ||
336 |
_2rdacontent _atexto _btxt |
||
337 |
_2rdamedia _asin mediaciĆ³n _bn |
||
338 |
_2rdacarrier _avolumen _bnc |
||
500 | _aIncluye 1 CD Rom. This book has a web site dedicated to it. The purpose of the web site is to keep this material updated. http://www.tracking-hackers.com/book (visited 23/03/07) | ||
505 | 8 | 0 | _aCONTENIDO Foreword: Giving the Hackers a Kick Where It Hurts Preface Ch. 1 The Sting: My Fascination with Honeypots 1 Ch. 2 The Threat: Tools, Tactics, and Motives of Attackers 11 Ch. 3 History and Definition of Honeypots 33 Ch. 4 The Value of Honeypots 49 Ch. 5 Classifying Honeypots by Level of Interaction 73 Ch. 6 BackOfficer Friendly 87 Ch. 7 Specter 109 Ch. 8 Honeyd 141 Ch. 9 Homemade Honeypots 167 Ch. 10 Man Trap 193 Ch. 11 Honeynets 229 Ch. 12 Implementing Your Honeypot 277 Ch. 13 Maintaining Your Honeypot 309 Ch. 14 Putting It All Together 341 Ch. 15 Legal Issues 367 Ch. 16 Future of Honeypots 387 App. A BackOfficer Friendly ASCII File of Scans 399 App. B Snort Configuration File 407 App. C IP Protocols 411 App. D Definitions, Requirements, and Standards Document 415 App. E Honeynet Logs 423 Index 429 |
650 | _aCOMPUTER SECURITY | ||
650 | _aCOMPUTER HACKERS | ||
650 | _aFIREWALLS | ||
650 | _aHONEYPOTS | ||
650 | _aSEGURIDAD INFORMATICA | ||
942 |
_cBK _2udc |