This page contains enriched content visible when JavaScript is enabled.
My Account
Library Home
Your session will expire automatically in
0
seconds.
Continue session
End session now
Request It
Save to My Lists
Export
Return to Browse
SearchType
Keyword
Title
Author (Last name first)
Subject
ISBN/ISSN
Call Number
Unit Code
Libraries Australia No.
Library of Congress No.
Search
Search Scope
Entire Collection
Print Books
E-books
All books
E-journals
All journals
Databases
All e-resources
Streaming Video
DVDs
Curriculum Resources
Deakin Theses
Special Collections
Melbourne Burwood
Warrnambool
Geelong Waterfront
Geelong Waurn Ponds
Limit search to available items
Previous Record
Next Record
  Permalink    
Title
Know your enemy : learning about security threats / The Honeynet Project
Edition
Second edition
Published
Boston : Addison-Wesley, 2004
Copies
Location
Call no.
Vol.
Availability
MELB
005.8 Hon/Kye 2004
AVAILABLE
Description
xxix, 768 pages : illustrations ; 24 cm
4 3/4 in
Contents
Pt. I. The honeynet -- Ch. 1. The beginning -- Ch. 2. Honeypots -- Ch. 3. Honeynets -- Ch. 4. GenI honeynets -- Ch. 5. GenII honeynets -- Ch. 6. Virtual honeynets -- Ch. 7. Distributed honeynets -- Ch. 8. Legal issues -- Pt. II. The analysis -- Ch. 9. The digital crime scene -- Ch. 10. Network forensics -- Ch. 11. Computer forensics basics -- Ch. 12. UNIX computer forensics -- Ch. 13. Windows computer forensics -- Ch. 14. Reverse engineering -- Ch. 15. Centralized data collection and analysis -- Pt. III. The enemy -- Ch. 16. Profiling -- Ch. 17. Attacks and exploits : lessons learned -- Ch. 18. Windows 2000 compromise and analysis -- Ch. 19. Linux compromise -- Ch. 20. Example of solaris compromise -- Ch. 21. The future -- App. A. IPTables firewall script -- App. B. Snort configuration -- App. C. Swatch configuration -- App. D. Network configuration summary -- App. E. Honeywall kernel configuration -- App. F. GenII rc.firewall configuration
Notes
Previous ed.: 2001
Includes CD-ROM
Formerly CIP. Uk
Bibliography
Includes bibliographical references (pages 721-735) and index
Notes
System requirements: Windows 95 or higher and Linux
SUBJECT
NIST special publication. Computer security. http://id.loc.gov/authorities/names/n92082456
Subject
Computer security.
Computer networks -- Security measures.
Author
Honeynet Project.
LC no.
2004003064
ISBN
0321166469 paperback
Other Titles
Learning about security threats
  Permalink