Honeypots for Windows (Books for Professionals by Professionals)
* Talks about hardening a Windows host before deploying Honeypot <P>* Covers how to create your own emulated services to fool hackers <P></P> <P>* Discusses physical setup of Honeypot and network necessary to draw hackers to Honeypot <P></P> <P>* Discusses how to use Snort to co-exist with Honeypot <P></P> <P>* Discusses how to use a Unix-style Honeypot to mimic a Windows host <P></P> <P>* Discusses how to fine-tune a Honeypot <P></P> <P>* Discusses OS fingerprinting, ARP tricks, packet sniffing, and exploit signatures <P></P>