ABSTRACT

A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytoken

chapter 1|37 pages

Honeypots

chapter 2|25 pages

Commercially Available Honeypots

chapter 3|28 pages

Honeynets

chapter 4|29 pages

Attacks and Role of Honeypots

chapter 5|20 pages

Static Honeypots

chapter 6|29 pages

Virtual Honeypots

chapter 7|18 pages

Dynamic Honeypots

chapter 8|50 pages

Wireless Honeypots

chapter 9|12 pages

Applications of Honeypots

chapter 10|49 pages

Anti-Honeypot Technology

chapter 11|26 pages

Honeypots and Network Forensics