Table of Contents
- Laying the Honeytrap: Introduction to Honeypots
- Honeypot Design and Implementation
- Deploying Network Honeypots
- Cloud Honeypot
- Securing Web Applications with Honeypots
- Shadow Server
- Monitoring Honeypot Activity
- Responding to Honeypot Attacks
- Defeating the Hackers
- Advanced Honeypot Techniques