Honeypots for Windows (Books for Professionals by Professionals)

| ||||||||||||
![]() |
| |||||
Chapter 1: An Introduction to Honeypots
- THE HONEYPOT AS A TOOL
- HONEYPOT INFORMATION RESOURCES
Chapter 2: A Honeypot Deployment Plan
- HOW THE ADDRESS RESOLUTION PROTOCOL WORKS
Chapter 3: Windows Honeypot Modeling
- A QUICK REVIEW OF WINDOWS PORT-RELATED PROTOCOLS AND SERVICES
Chapter 5: Honeyd Installation
- OPEN SOURCE IS FREE SOFTWARE
- HONEYD SUBSYSTEMS AND PLUG-INS FOR UNIX
Chapter 7: Honeyd Service Scripts
- THE PROBLEM WITH WORM CLEANERS
Chapter 8: Other Windows-Based Honeypots
- HOW SPAMMERS WORK AND THE DAMAGE THEY DO
Chapter 9: Network Traffic Analysis
- OSI MODELS WITHIN OSI MODELS
- PRACTICE TIME
- WHY USE A VIRUS RULES SET?
Chapter 10: Honeypot Monitoring
- TOWER OF BABEL PROBLEM
- SEM/SIM VENDORS
Chapter 11: Honeypot Data Analysis
- BOOTABLE FORENSIC DISTRIBUTIONS
Chapter 12: Malware Code Analysis
- SLACK SPACE
| |||||