Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Honeypots: Tracking Hackers
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Honeypots: Tracking Hackers

Honeypots: Tracking Hackers

Lance Spitzner

512 pages, parution le 02/01/2003

Résumé

Honeypots are a unique technology; they are systems designed to be probed, attacked, or compromised by an attacker. Whether used as a simple "burglar alarm," incident response, or as a tool for gathering information about hacker motives and tactics, a honeypot can add serious firepower to your security arsenal. By implementing a honeypot, you have unprecedented ability to take the offensive against hackers.

Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. Starting with a basic examination of honeypots and the different roles they can play, the book moves on to in-depth explorations of six specific kinds of real-world honeypots:

* BackOfficer Friendly
* Specter™
* Honeyd
* Homemade honeypots
* ManTrap®
* Honeynets

Detailed discussion of each honeypot shows their unique advantages and tradeoffs, the way a real attack will look to each honeypot, plus a variety of deployment and maintenance issues.

Honeypots also includes an entire chapter dedicated to the legal issues surrounding honeypot use. Written with the guidance of three legal experts, this material covers issues of privacy, entrapment, and liability. Additionally, the book provides an overview of the Fourth Amendment, the Electronic Communications Privacy Act, the Wiretap Act, and the Pen/Trap Statute, with an emphasis on how they apply to honeypots.

With this book you will gain an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment. You will arm yourself with the expertise to track attackers and learn about them on your own. Security professionals, researchers, law enforcement agents, and members of the intelligence and military communities will find this book indispensable.

The CD-ROM contains whitepapers, source code, and data captures of real attacks. Armed with the CD-ROM, not only can you build and deploy your own honeypot solutions, you can also analyze real attacks captured with them.

Contents
  • 1. The Sting: My Fascination with Honeypots.
  • 2. The Threat: Tools, Tactics, and Motives of Attackers.
  • 3. History and Definition of Honeypots.
  • 4. The Value of Honeypots.
  • 5. Classifying Honeypots by Level of Interaction.
  • 6. BackOfficer Friendly.
  • 7. Specter.
  • 8. Honeyd.
  • 9. Homemade Honeypots.
  • 10. ManTrap.
  • 11. Honeynets.
  • 12. Implementing Your Honeypot.
  • 13. Maintaining Your Honeypot.
  • 14. Putting It All Together.
  • 15. Legal Issues.
  • 16. Future of Honeypots.
  • A Final Caveat.
  • Appendix A. BackOfficer Friendly ASCII File of Scans.
  • Appendix B. Snort Configuration File.
  • Appendix C. IP Protocols.
  • Appendix D. Definitions, Requirements, and Standards Document.
  • Appendix E. Honeynet Logs.

Caractéristiques techniques

  PAPIER
Éditeur(s) Addison Wesley
Auteur(s) Lance Spitzner
Parution 02/01/2003
Nb. de pages 512
Format 18,5 x 23,5
Couverture Broché
Poids 993g
Intérieur Noir et Blanc
EAN13 9780321108951
ISBN13 978-0-3211-0895-1

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription