Limit search to available items
Book Cover
Book

Title Know your enemy : learning about security threats / The Honeynet Project
Edition Second edition
Published Boston : Addison-Wesley, 2004

Copies

Location Call no. Vol. Availability
 MELB  005.8 Hon/Kye 2004  AVAILABLE
Description xxix, 768 pages : illustrations ; 24 cm
4 3/4 in
Contents Pt. I. The honeynet -- Ch. 1. The beginning -- Ch. 2. Honeypots -- Ch. 3. Honeynets -- Ch. 4. GenI honeynets -- Ch. 5. GenII honeynets -- Ch. 6. Virtual honeynets -- Ch. 7. Distributed honeynets -- Ch. 8. Legal issues -- Pt. II. The analysis -- Ch. 9. The digital crime scene -- Ch. 10. Network forensics -- Ch. 11. Computer forensics basics -- Ch. 12. UNIX computer forensics -- Ch. 13. Windows computer forensics -- Ch. 14. Reverse engineering -- Ch. 15. Centralized data collection and analysis -- Pt. III. The enemy -- Ch. 16. Profiling -- Ch. 17. Attacks and exploits : lessons learned -- Ch. 18. Windows 2000 compromise and analysis -- Ch. 19. Linux compromise -- Ch. 20. Example of solaris compromise -- Ch. 21. The future -- App. A. IPTables firewall script -- App. B. Snort configuration -- App. C. Swatch configuration -- App. D. Network configuration summary -- App. E. Honeywall kernel configuration -- App. F. GenII rc.firewall configuration
Notes Previous ed.: 2001
Includes CD-ROM
Formerly CIP. Uk
Bibliography Includes bibliographical references (pages 721-735) and index
Notes System requirements: Windows 95 or higher and Linux
SUBJECT NIST special publication. Computer security. http://id.loc.gov/authorities/names/n92082456
Subject Computer security.
Computer networks -- Security measures.
Author Honeynet Project.
LC no. 2004003064
ISBN 0321166469 paperback
Other Titles Learning about security threats