Honeypots for Windows

Honeypots for Windows pdf

意见:

1281

语:

英语

评分:

0

部门:

技术

页数:

406

部分:

黑客

文件大小:

8425576 MB

书籍质量 :

好的

下载一本书:

60

通知

由于网站正在更新,下载将暂时停止,直至更新完成 [email protected]

罗杰·格莱姆斯,KnowBe4 的数据驱动防御传播者,是一位 30 年的计算机安全顾问、讲师、数十项计算机认证的持有者,以及 13 本书和 1,000 多篇关于计算机安全的杂志文章的获奖作者。 他现在担任 KnowBe4 的数据驱动防御传播者。 他曾在一些世界上最大的计算机安全公司工作,包括 Foundstone、McAfee 和 Microsoft。 Grimes 拥有 Old Dominion 大学的学士学位。 从 2005 年到 2019 年,他是 InfoWorld 和 CSO 杂志的每周安全专栏作家。

书的描述

Honeypots for Windows pdf 罗杰格莱姆斯

Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for help. But Honeypots for Windows is a forensic journeyhelping you set up the physical layer, design your honeypot, and perform malware code analysis. You'll discover which Windows ports need to be open on your honeypot to fool those malicious hackers, and you'll learn about numerous open source tools imported from the Unix world. Install a honeypot on your DMZ or at home and watch the exploits roll in! Your honeypot will capture waves of automated exploits, and youll learn how to defend the computer assets under your control.

书评

0

out of

5 stars

0

0

0

0

0

Book Quotes

Top rated
Latest
Quote
there are not any quotes

there are not any quotes

更多书籍 罗杰格莱姆斯

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
黑客
4.0000
2581
English
罗杰格莱姆斯
Hacking the Hacker: Learn From the Experts Who Take Down Hackers pdf 罗杰格莱姆斯
Cryptography Apocalypse
Cryptography Apocalypse
计算数学
1440
English
罗杰格莱姆斯
Cryptography Apocalypse pdf 罗杰格莱姆斯
Hacking Multifactor Authentication
Hacking Multifactor Authentication
黑客
2229
English
罗杰格莱姆斯
Hacking Multifactor Authentication pdf 罗杰格莱姆斯
Ransomware Protection Playbook
Ransomware Protection Playbook
黑客
1332
English
罗杰格莱姆斯
Ransomware Protection Playbook pdf 罗杰格莱姆斯

更多书籍 黑客

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
2593
English
凯文·米特尼克
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers pdf 凯文·米特尼克
The art of deception: controlling the human element of security
The art of deception: controlling the human element of security
2982
English
凯文·米特尼克
The art of deception: controlling the human element of security pdf 凯文·米特尼克
No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing
No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing
1897
English
凯文·米特尼克
No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing pdf 凯文·米特尼克
Hardware Hacking: Have Fun While Voiding Your Warranty
Hardware Hacking: Have Fun While Voiding Your Warranty
2533
English
凯文·米特尼克
Hardware Hacking: Have Fun While Voiding Your Warranty pdf 凯文·米特尼克

Add Comment

Authentication required

You must log in to post a comment.

Log in
There are no comments yet.