36,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
  • Broschiertes Buch

Due to expose of information on networks and relying on the Internet, there have been a surge number of attacks against servers and host systems. Honeypots' technology is evolving to collect information about these kinds of attacks by simulating the human behavior for analyzing existing attacks. In as much as, Honeypot categorized as a subset of Intrusion Deception Systems, following human pattern behavior is the final aim that should be considered in developing and deploying Honeypot systems. The focus of this book is to understand and determine the effectiveness of client Honeypot interaction in order to capture more data.…mehr

Produktbeschreibung
Due to expose of information on networks and relying on the Internet, there have been a surge number of attacks against servers and host systems. Honeypots' technology is evolving to collect information about these kinds of attacks by simulating the human behavior for analyzing existing attacks. In as much as, Honeypot categorized as a subset of Intrusion Deception Systems, following human pattern behavior is the final aim that should be considered in developing and deploying Honeypot systems. The focus of this book is to understand and determine the effectiveness of client Honeypot interaction in order to capture more data.
Autorenporträt
Roza Honarbakhsh received the B.Sc. degree in Software Engineering and M.Sc. degree in Information Security from University Technology Malaysia in 2011. She has published in ISI International Indexing Journal and some International conferences.