Network Security and ISO 27001 / 17799 News
  Create an account
:: Home  ::  Downloads  ::  Your Account  ::  Forums  ::


Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.
Site Navigation
· Home
· Contribute Story!
· Downloads
· Encyclopedia
· Feedback Form
· Forums
· Infosecurity
· Iso17799-FAQ
· Legal
· Maillists
· Newsfeeds
· RFCs
· Search
· Stories Archive
· Surveys
· Top 10
· Topics
· Web Links
· Your_Account
User Info
Welcome, Anonymous
Latest: REav
New Today: 0
New Yesterday: 0
Overall: 54703

People Online:
Visitors: 10
Members: 0
Total: 10
Who's Online
There are currently, 10 guest(s) and 0 member(s) that are online.

You are Anonymous user. You can register for free by clicking here
BS7799 and ISO 17799
The following resources should prove to be good starting points for the standards:

Theory & information:
BS7799 & ISO 27001
Official downloads:
BS7799, ISO 17799, ISO 27001
User group for both:
ISO 17799, ISO 27001

Have security issues stalled VoIP deployments within your company?



Votes 140

Honeypots: Tracking Hackers

I just read this book and am really impressed. It is not worse or better than other similar books. It is just the only serious book around.(on these issues). Perhaps you could compare it with 'Know your Enemy' (KyE) but then 'Tracking Hackers' would win hands down. After all, about the same content of KyE can be found in the pages of 'The Honeynet Project'. Of course KyE is more concise and organized (than the site), easier to use for understanding Honeynets, and several original attacks are discussed in the book. A good book indeed. However, HTH is very special, because for the first time there is an extensive discussion about Honeypots, in a unique document (book). And it is very well written. From beginners to experts everybody will enjoy the book. Every single detail is clearly and patiently explained and fitted in the honeypots puzzle. The case studies are clever and representative. The Honeypots are classified according their level of interaction, and treated following the same sequence: BOF, Specter, Honeyd, Man Trap, and 'Home Made' Honeypots (including Jailed Environments) are thoroughly analyzed. Even Honeynets are discussed, and an significative case study is used to 'put all together'. As a bonus the related 'legal issues' are also discussed (new to me). At the bottom line it is an excellent book not only for reading (beginners and intermediates), but also for being used by experts as a reference in Security Courses (just what I am planning to do).

Added: May 19th 2003
Reviewer: Marco de Vivo
Related Link: Purchase at Amazon
Hits: 2837
Language: english


[ Back to Reviews Index | Post Comment ] Network security and BS7799 / ISO 17799 / ISO 27001 News
2003 PacketDefense. Network Defense in Depth using ISO 27000
Web site engine's code is Copyright © 2003 by phpnuke dot org. All Rights Reserved. PHP-Nuke is Free Software released under the GNU/GPL.
Page Generation: 0.284 Seconds