Honeypots for Windows (Books for Professionals by Professionals)

skip navigation

List of Sidebars
Honeypots for Windows
by Roger A. Grimes
Apress 2005

Chapter 1: An Introduction to Honeypots

THE HONEYPOT AS A TOOL
HONEYPOT INFORMATION RESOURCES

Chapter 2: A Honeypot Deployment Plan

HOW THE ADDRESS RESOLUTION PROTOCOL WORKS

Chapter 3: Windows Honeypot Modeling

A QUICK REVIEW OF WINDOWS PORT-RELATED PROTOCOLS AND SERVICES

Chapter 5: Honeyd Installation

OPEN SOURCE IS FREE SOFTWARE
HONEYD SUBSYSTEMS AND PLUG-INS FOR UNIX

Chapter 7: Honeyd Service Scripts

THE PROBLEM WITH WORM CLEANERS

Chapter 8: Other Windows-Based Honeypots

HOW SPAMMERS WORK AND THE DAMAGE THEY DO

Chapter 9: Network Traffic Analysis

OSI MODELS WITHIN OSI MODELS
PRACTICE TIME
WHY USE A VIRUS RULES SET?

Chapter 10: Honeypot Monitoring

TOWER OF BABEL PROBLEM
SEM/SIM VENDORS

Chapter 11: Honeypot Data Analysis

BOOTABLE FORENSIC DISTRIBUTIONS

Chapter 12: Malware Code Analysis

SLACK SPACE

Категории