* Talks about hardening a Windows host before deploying Honeypot
* Covers how to create your own emulated services to fool hackers
* Discusses physical setup of Honeypot and network necessary to draw hackers to Honeypot
* Discusses how to use Snort to co-exist with Honeypot
* Discusses how to use a Unix-style Honeypot to mimic a Windows host
* Discusses how to fine-tune a Honeypot
* Discusses OS fingerprinting, ARP tricks, packet sniffing, and exploit signatures
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Roger A. Grimes (CPA, CISSP, MCSE: Security (NT/2000/2003/MVP), CEH, TICSA, Security+, MCT) is a Windows security consultant, instructor, and author. This is Grimes' third book and he has written over a 150 articles for magazines like Windows IT Pro, Microsoft Certified Professional, InfoWorld, Network Magazine, Windows & .NET, and Security Administrator. He is a contributing editor for Windows & .NET, and InfoWorld magazines. Grimes has presented at Windows Connections, MCP TechMentors, and SANS. He was recognized as "Most Valuable Professional" (MVP) by Microsoft, for Windows Server 2003 security. Grimes also writes frequently for Microsoft, including material for two courses on advanced Windows security and Technet. He has taught security to many of the world's largest and most respected organizations, including Microsoft, VeriSign, the U.S. Navy, various universities, and public school systems. Grimes spends his time surrounded by the maddening hum of twelve 1U servers in his home office, monitoring his personal honeypots.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.