LEADER 03276nam 2200637 450 001 9910788432303321 005 20230725045709.0 010 $a1-306-77960-X 010 $a3-486-71151-2 024 7 $a10.1524/9783486711516 035 $a(CKB)3360000000351772 035 $a(EBL)1348689 035 $a(SSID)ssj0001121076 035 $a(PQKBManifestationID)11633801 035 $a(PQKBTitleCode)TC0001121076 035 $a(PQKBWorkID)11160670 035 $a(PQKB)10319465 035 $a(MiAaPQ)EBC1348689 035 $a(DE-B1597)233046 035 $a(OCoLC)979892041 035 $a(DE-B1597)9783486711516 035 $a(Au-PeEL)EBL1348689 035 $a(CaPaEBR)ebr10883524 035 $a(CaONFJC)MIL609211 035 $a(OCoLC)879550638 035 $a(EXLCZ)993360000000351772 100 $a20140626h20112011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aClient-Honeypots $eexploring malicious websites /$fJan Gerrit Go?bel, Andreas Dewald ; with a foreword by Prof. Dr. Felix Freiling ; Kathrin Mo?nch, editor 210 1$aMu?nchen, Germany :$cOldenbourg Verlag Mu?nchen,$d2011. 210 4$dİ2011 215 $a1 online resource (236 p.) 300 $aDescription based upon print version of record. 311 $a3-486-70526-1 320 $aIncludes bibliographical references and index. 327 $tFront Matter -- $t1 Introduction -- $t2 Honeypot Basics -- $t3 An Introduction to Client-Side Exploits -- $t4 Protection and Analysis Tools -- $t5 A Survey of current Client-Side Honeypots -- $t6 Composing a Honeyclient-Framework -- $t7 Operating Selected Client-Side Honeypots -- $t8 Epilogue -- $tBack Matter 330 $aWith the increasing resilience of operating systems towards automated attacks, the application layer has come into the focus of criminals. Specially prepared websites in the World Wide Web compromise visitors by exploiting vulnerabilities in web browsers, emails with attached files exploit common email applications, and embedded links in instant messenger or Twitter messages lead to malware contaminated sites. This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy. 606 $aComputer networks$xSecurity measures 615 0$aComputer networks$xSecurity measures. 676 $a005.8 686 $aST 277$2rvk 700 $aGo?bel$b Jan Gerrit$01560124 702 $aDewald$b Andreas 702 $aFreiling$b Felix 702 $aMo?nch$b Kathrin 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910788432303321 996 $aClient-Honeypots$93825825 997 $aUNINA LEADER 01135nam0 22002771i 450 001 UON00046648 005 20231205102209.420 100 $a20020107d1962 |0itac50 ba 101 $arus$aARM 102 $aSU 105 $a|||| 1|||| 200 1 $aArmjanskie istocniki o Mongolax$eIzvlecenija iz rukopisej XII-XIV vv. / perevod s drevnearmjanskogo, predislovie i primecanija A.G. Galstjana 210 $aMoskva$cIzd. Vostocnoj Literatury$d1962 215 $a154 p.$d22 cm 500 1$3UON00355830$aPatmowt'iwn Hayoc'$958524 606 $aMongolia$xStoria$xSec. XIII-XIV$xFonti$3UONC010250$2FI 620 $aRU$dMoskva$3UONL003152 686 $aMON IV A$cMONGOLIA - STORIA CLASSICA$2A 702 1$aGALSTJAN$bA. G.$3UONV029556 712 $aAkademija Nauk SSSR$3UONV247334$4650 801 $aIT$bSOL$c20250711$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00046648 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI MON IV A 007 $eSI TUR1631 5 007 996 $aPatmowt'iwn Hayoc$958524 997 $aUNIOR