語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Mastering honeypots : = art of deception for cybersecurity defense /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Mastering honeypots :/ Mukesh Choudhary.
其他題名:
art of deception for cybersecurity defense /
作者:
Choudhary, Mukesh.
面頁冊數:
1 online resource (290 pages)
標題:
COMPUTERS / Security / General. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000684.html
ISBN:
9789355516107
Mastering honeypots : = art of deception for cybersecurity defense /
Choudhary, Mukesh.
Mastering honeypots :
art of deception for cybersecurity defense /Mukesh Choudhary. - 1 online resource (290 pages)
Includes bibliographical references and index.
Mastering honeypots : art of deception for cybersecurity defense -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Code Bundle and Coloured Images -- Table of Contents -- 1. Laying the Honeytrap: Introduction to Honeypots -- 2. Honeypot Design and Implementation -- 3. Deploying Network Honeypots -- 4. Cloud Honeypot -- 5. Securing Web Applications with Honeypots -- 6. Shadow Server -- 7. Monitoring Honeypot Activity -- 8. Responding to Honeypot Attacks -- 9. Defeating the Hackers -- 10. Advanced Honeypot Techniques -- Index.
Access restricted to authorized users and institutions.
Honeypots are like digital traps designed to lure malicious attackers away from your real systems. Imagine setting up a fake store to attract thieves while your real store is safe and hidden. Honeypots work in a similar way, drawing the attention of cybercriminals and allowing you to study their tactics and potentially prevent future attacks. This book simplifies the concept of honeypots, which are important tools in cybersecurity. The book explains their history, types, and how to design and use them effectively. It includes practical advice on setting up honeypots, monitoring them, and analyzing attacks. It also offers strategies for blue team professionals, like SOC analysts, to improve defenses and serves as a helpful resource for purple team members to practice detecting attacks. Additionally, it discusses how honeypots contribute to threat intelligence and cybersecurity training, including new ideas like quantum honeypots, preparing professionals to face modern cyber threats. By the end of this book, you will be able to effectively deploy and manage honeypots, analyze attack data, and implement strategies to protect your organization from malicious attacks. KEY FEATURES Design and deployment of honeypot to trap hackers. Step-by-step guide for implementation with best practices. Quantum insights and threat anticipation for future-proof defense. WHAT YOU WILL LEARN Acquire an understanding of honeypot technology, from foundational concepts to advanced techniques. Learn how to design and implement honeypots tailored to specific security needs and threat landscapes. Effectively monitor and analyze honeypot data to detect and respond to attacks. Explore advanced honeypot techniques, such as honeypot farms and distributed honeypot networks. Gain insights into the latest trends and best practices in honeypot deployment and management. WHO THIS BOOK IS FOR This book is a vital resource for CTOs, CISOs, InfoSec managers, InfoSec analysts, and network admins. This book will help students and researchers who are working in the domain of cybersecurity.
Mode of access: World Wide Web.
ISBN: 9789355516107Subjects--Topical Terms:
1483863
COMPUTERS / Security / General.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Mastering honeypots : = art of deception for cybersecurity defense /
LDR
:03646nam a2200289 i 4500
001
1157339
006
m eo d
007
cr cn |||m|||a
008
250717s2024 ob 000 0 eng d
020
$a
9789355516107
020
$a
9789355519221
035
$a
BPB0000684
041
0
$a
eng
050
0 0
$a
QA76.9.A25
082
0 0
$a
005.8
100
1
$a
Choudhary, Mukesh.
$3
1483950
245
1 0
$a
Mastering honeypots :
$b
art of deception for cybersecurity defense /
$c
Mukesh Choudhary.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2024.
264
4
$c
©2025
300
$a
1 online resource (290 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Mastering honeypots : art of deception for cybersecurity defense -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Code Bundle and Coloured Images -- Table of Contents -- 1. Laying the Honeytrap: Introduction to Honeypots -- 2. Honeypot Design and Implementation -- 3. Deploying Network Honeypots -- 4. Cloud Honeypot -- 5. Securing Web Applications with Honeypots -- 6. Shadow Server -- 7. Monitoring Honeypot Activity -- 8. Responding to Honeypot Attacks -- 9. Defeating the Hackers -- 10. Advanced Honeypot Techniques -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
Honeypots are like digital traps designed to lure malicious attackers away from your real systems. Imagine setting up a fake store to attract thieves while your real store is safe and hidden. Honeypots work in a similar way, drawing the attention of cybercriminals and allowing you to study their tactics and potentially prevent future attacks. This book simplifies the concept of honeypots, which are important tools in cybersecurity. The book explains their history, types, and how to design and use them effectively. It includes practical advice on setting up honeypots, monitoring them, and analyzing attacks. It also offers strategies for blue team professionals, like SOC analysts, to improve defenses and serves as a helpful resource for purple team members to practice detecting attacks. Additionally, it discusses how honeypots contribute to threat intelligence and cybersecurity training, including new ideas like quantum honeypots, preparing professionals to face modern cyber threats. By the end of this book, you will be able to effectively deploy and manage honeypots, analyze attack data, and implement strategies to protect your organization from malicious attacks. KEY FEATURES Design and deployment of honeypot to trap hackers. Step-by-step guide for implementation with best practices. Quantum insights and threat anticipation for future-proof defense. WHAT YOU WILL LEARN Acquire an understanding of honeypot technology, from foundational concepts to advanced techniques. Learn how to design and implement honeypots tailored to specific security needs and threat landscapes. Effectively monitor and analyze honeypot data to detect and respond to attacks. Explore advanced honeypot techniques, such as honeypot farms and distributed honeypot networks. Gain insights into the latest trends and best practices in honeypot deployment and management. WHO THIS BOOK IS FOR This book is a vital resource for CTOs, CISOs, InfoSec managers, InfoSec analysts, and network admins. This book will help students and researchers who are working in the domain of cybersecurity.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Security / General.
$2
bisacsh
$3
1483863
650
7
$a
COMPUTERS / Networking / General.
$2
bisacsh
$3
1483951
650
7
$a
COMPUTERS / Information Technology.
$2
bisacsh
$3
1057148
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000684.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入