Résumé
Honeypots are a unique technology; they are systems designed to be probed, attacked, or compromised by an attacker. Whether used as a simple "burglar alarm," incident response, or as a tool for gathering information about hacker motives and tactics, a honeypot can add serious firepower to your security arsenal. By implementing a honeypot, you have unprecedented ability to take the offensive against hackers.
Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. Starting with a basic examination of honeypots and the different roles they can play, the book moves on to in-depth explorations of six specific kinds of real-world honeypots:
* BackOfficer Friendly
* Specter™
* Honeyd
* Homemade honeypots
* ManTrap®
* Honeynets
Detailed discussion of each honeypot shows their unique advantages and tradeoffs, the way a real attack will look to each honeypot, plus a variety of deployment and maintenance issues.
Honeypots also includes an entire chapter dedicated to the legal issues surrounding honeypot use. Written with the guidance of three legal experts, this material covers issues of privacy, entrapment, and liability. Additionally, the book provides an overview of the Fourth Amendment, the Electronic Communications Privacy Act, the Wiretap Act, and the Pen/Trap Statute, with an emphasis on how they apply to honeypots.
With this book you will gain an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment. You will arm yourself with the expertise to track attackers and learn about them on your own. Security professionals, researchers, law enforcement agents, and members of the intelligence and military communities will find this book indispensable.
The CD-ROM contains whitepapers, source code, and data captures of real attacks. Armed with the CD-ROM, not only can you build and deploy your own honeypot solutions, you can also analyze real attacks captured with them.
Contents- 1. The Sting: My Fascination with Honeypots.
- 2. The Threat: Tools, Tactics, and Motives of Attackers.
- 3. History and Definition of Honeypots.
- 4. The Value of Honeypots.
- 5. Classifying Honeypots by Level of Interaction.
- 6. BackOfficer Friendly.
- 7. Specter.
- 8. Honeyd.
- 9. Homemade Honeypots.
- 10. ManTrap.
- 11. Honeynets.
- 12. Implementing Your Honeypot.
- 13. Maintaining Your Honeypot.
- 14. Putting It All Together.
- 15. Legal Issues.
- 16. Future of Honeypots.
- A Final Caveat.
- Appendix A. BackOfficer Friendly ASCII File of Scans.
- Appendix B. Snort Configuration File.
- Appendix C. IP Protocols.
- Appendix D. Definitions, Requirements, and Standards Document.
- Appendix E. Honeynet Logs.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Addison Wesley |
Auteur(s) | Lance Spitzner |
Parution | 02/01/2003 |
Nb. de pages | 512 |
Format | 18,5 x 23,5 |
Couverture | Broché |
Poids | 993g |
Intérieur | Noir et Blanc |
EAN13 | 9780321108951 |
ISBN13 | 978-0-3211-0895-1 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet