| Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for help. But Honeypots for Windows is a forensic journey—helping you set up the physical layer, design your honeypot, and perform malware code analysis.
You’ll discover which Windows ports need to be open on your honeypot to fool those malicious hackers, and you’ll learn about numerous open source tools imported from the Unix world. Install a honeypot on your DMZ or at home and watch the exploits roll in! Your honeypot will capture waves of automated exploits, and you’ll learn how to defend the computer assets under your control. |
|
|
Advanced Topics in Global Information Management, Vol. 2Advanced Topics in Global Information Management includes original material concerned with all aspects of global information management in three areas: Global Information Systems in Business Functions, Information Technology in Specific Regions of the World, and Management of Global Information Resources and Applications. The focus of volume two is... | | Syngress Force 2006 Emerging Threat Analysis: From Mischief to MaliciousOver the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and... | | ThermoPoetics: Energy in Victorian Literature and Science
In ThermoPoetics, Barri Gold sets out to show us how analogous, intertwined, and mutually productive poetry and physics may be. Charting the simultaneous emergence of the laws of thermodynamics in literature and in physics that began in the 1830s, Gold finds that not only can science influence literature, but literature can influence... |
|