Books on the topic 'Honeypots'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Honeypots.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Thorsten, Holz, ed. Virtual honeypots. Upper Saddle River, NJ: Addison-Wesley, 2007.
Find full text1882-1956, Milne A. A., ed. Disney's Pooh's five little honeypots. [Burbank, CA]: Mouse Works, 1998.
Find full text(Firm), LeapFrog, ed. Lots and lots of honeypots. Emeryville, Calif: LeapFrog, 2001.
Find full textTemple, Honey B. Honeypot: Learning to dodge the bullets. Berkeley, CA: The author, 2004.
Find full textAnjali, Sardana, ed. Honeypot: A new paradigm to information security. Enfield, N.H: Science Publishers, 2011.
Find full textPeter, Avis, and Blackham Stuart, eds. Honeypot: A teacher's guide to primary technology. 2nd ed. Doncaster: Resource, 1994.
Find full textNG, Chee Keong, Lei Pan, and Yang Xiang. Honeypot Frameworks and Their Applications: A New Framework. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7739-5.
Full textWoodward, Melanie. Construction of a honeypot to monitor unauthorised systems access and the role of a honeypot as a part of a business security solution. Oxford: Oxford Brookes University, 2002.
Find full textBodmer, E. The electric honeypot: The profitability of deregulated electric generation companies. Washington, DC: American Public Power Association, 2007.
Find full textStyle, Sue. Honey: From hive to honeypot : a celebration of bees and their bounty. San Francisco: Chronicle Books, 1993.
Find full textCommission, Care. Integrated inspection by the Care Commission and HM Inspectorate of Education of The Honeypot Nursery, Scone. Dundee: Care Commission, 2004.
Find full textCommission, Care. Integrated inspection by the Care Commission and HM Inspectorate of Education of The Honeypot Children's Nursery, Luncarty. Dundee: Care Commission, 2004.
Find full textMohammed, Mohssen, and Habib-ur Rehman. Honeypots and Routers. Auerbach Publications, 2015. http://dx.doi.org/10.1201/b19660.
Full textMohammed, Mohssen, and Habib ur Rehman. Honeypots and Routers. Taylor & Francis Group, 2020.
Find full textDewald, Andreas. Client-Honeypots: Exploring Malicious Websites. de Gruyter GmbH, Walter, 2011.
Find full textGöbel, Jan Gerrit, and Andreas Dewald. Client-Honeypots: Exploring Malicious Websites. de Gruyter GmbH, Walter, 2011.
Find full textWagner, Alex. Hacking: Hacking Firewalls & Bypassing Honeypots. Independently Published, 2019.
Find full textGöbel, Jan Gerrit, and Andreas Dewald. Client-Honeypots: Exploring Malicious Websites. de Gruyter GmbH, Walter, 2010.
Find full textMohammed, Mohssen, and Habib ur Rehman. Honeypots and Routers: Collecting Internet Attacks. Auerbach Publishers, Incorporated, 2015.
Find full textMohammed, Mohssen, and Habib-ur Rehman. Honeypots and Routers: Collecting Internet Attacks. Auerbach Publishers, Incorporated, 2015.
Find full textJoshi, R. C., and Anjali Sardana. Honeypots: A New Paradigm to Information Security. Taylor & Francis Group, 2011.
Find full textCargill, Acie. Jeffrey Epstein Honeypots: Wealth, Women, and Girls. Independently Published, 2019.
Find full textJoshi, R. C., and Anjali Sardana. Honeypots: A New Paradigm to Information Security. Taylor & Francis Group, 2011.
Find full textHolz, Thorsten, and Niels Provos. Virtual Honeypots: From Botnet Tracking to Intrusion Detection. Addison Wesley Professional, 2007.
Find full textHolz, Thorsten, and Niels Provos. Virtual Honeypots: From Botnet Tracking to Intrusion Detection. Pearson Education, Limited, 2021.
Find full textHolz, Thorsten, and Niels Provos. Virtual Honeypots: From Botnet Tracking to Intrusion Detection. Addison-Wesley Professional, 2007.
Find full textJohnson, E. Patrick. Honeypot. Duke University Press, 2019. http://dx.doi.org/10.1215/9781478007241.
Full text