Text
Honeypots: a new paradigm to information security
Terdapat bibliografi dan indeks.
Table of contents:
1.Honeypots
2.Commercially Available Honeypots
3.Honeynets
4.Attacks and Role of Honeypots
5.Static Honeypots
6.Virtual Honeypots
7.Dynamic Honeypots
8.Wireless Honeypots
9.Applications of Honeypots
10.Anti-Honeypot Technology
11.Honeypots and Network Forensics
No other version available