Honeypots for Windows and over one million other books are available for Amazon Kindle. Learn more

Vous voulez voir cette page en français ? Cliquez ici.

Sign in to turn on 1-Click ordering.
Amazon Prime Free Trial required. Sign up when you check out. Learn More
More Buying Choices
Have one to sell? Sell yours here
Start reading Honeypots for Windows on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Honeypots for Windows [Paperback]

Roger A. Grimes

List Price: CDN$ 44.64
Price: CDN$ 28.43 & FREE Shipping. Details
You Save: CDN$ 16.21 (36%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Want it delivered Thursday, October 23? Choose One-Day Shipping at checkout.


Amazon Price New from Used from
Kindle Edition CDN $26.65  
Paperback CDN $28.43  
Join Amazon Student in Canada

Book Description

Feb. 16 2005 Books for Professionals by Professionals

...a handy book to keep as a general security reference.

— Lou Vega, member, Greater Charleston .NET User Group

...this looks like it'd be cool as h3ll to really do.

— Bill Ryan, Bills House O Insomnia

Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for help. But Honeypots for Windows is a forensic journeyhelping you set up the physical layer, design your honeypot, and perform malware code analysis.

Youll discover which Windows ports need to be open on your honeypot to fool those malicious hackers, and youll learn about numerous open source tools imported from the Unix world. Install a honeypot on your DMZ or at home and watch the exploits roll in! Your honeypot will capture waves of automated exploits, and youll learn how to defend the computer assets under your control.

Customers Who Bought This Item Also Bought

Product Details

Product Description

About the Author

Roger A. Grimes (CPA, CISSP, MCSE: Security (NT/2000/2003/MVP), CEH, TICSA, Security+, MCT)&emdash;is a 17-year Windows security consultant, instructor, and author. This is Grimes' third book and he has written
over a 150 articles for magazines like Windows IT Pro, Microsoft
Certified Professional, InfoWorld, Network Magazine, Windows & .NET,
and Security Administrator. He is a contributing editor for Windows & .NET, and InfoWorld magazines.

Grimes has presented at Windows Connections, MCP TechMentors, and SANS. He was recently recognized as Most Valuable Professional (MVP) by Microsoft, for Windows Server 2003 security. Grimes also writes frequently for Microsoft, including material for two courses on advanced Windows security and Technet. He has taught security to many of the world's largest and most respected organizations, including Microsoft, VeriSign, the U.S. Navy, various universities, and public school systems. Grimes spends his time surrounded by the maddening hum
of twelve 1U servers in his home office, monitoring his personal

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 5.0 out of 5 stars  5 reviews
8 of 9 people found the following review helpful
5.0 out of 5 stars Immediate and useful information! April 13 2005
By Christopher G. Williams - Published on Amazon.com
Review by Lou Vega of the Greater Charleston .NET User Group

This book provides immediate and useful information whether you have previous experience with Honeypots or hadn't even heard of one until you picked up the book. I would recommend this book to anyone who has ever been interested in network and systems security as it pertains to a Microsoft Windows environment, especially in light of the fact that most previous books and articles with information about Honeypots were geared toward *nix systems.

Those who have no previous experience with Honeypots and would like a background lesson can jump right into Chapters 1 and 2 which should give them a fair basic understanding of what's involved. Those persons who want to get right to work...start browsing between chapters 3 and 8 for hands on information including screenshots and installation/configuration information. Later chapters cover more advanced information concerning the monitoring and analysis of the traffic captured using your Honeypot.

The author doesn't leave you stranded with just setting up a Honeypot either. The chapters on Network Analysis, Honeypot Monitoring and alerting, and Honeypot data analysis give you a chance to begin to make real use of the Honeypot and the data gathered while using it. The walkthroughs for setting these analysis and monitoring tools seem easy enough and the author makes good use of available open source tools out there for those who don't have the budget for some of the commercial applications available.

An added bonus for any networking security person is the wealth of information concerning how to harden a Windows Server, common ports used in malware and numerous configuration demonstrations make this a handy book to keep as a general security reference.

This book will make a fine addition to any IT professional's reference collection.
2 of 2 people found the following review helpful
5.0 out of 5 stars Must Have for any Windows Administrator Nov. 21 2005
By David Williams - Published on Amazon.com
Before reading Roger's book I was pretty sure I had a solid understanding of Honeypots, how they work, how they should be deployed, etc. I can honestly say that I still learned a lot from this book. Recommended for beginner to advanced user. The examples are great and very specific. Running a honeypot in a windows environment definately benefits many of my clients because they are unsure how to properly secure a *nix machine. This book showed me step-by-step how to set-up a fully functional Windows Honeypot that anyone can administer. Thanks for the great info Mr. Grimes, can't wait to read the next book.
2 of 3 people found the following review helpful
5.0 out of 5 stars Excellent May 24 2005
By C. Sirkhan - Published on Amazon.com
I have been recently doing research on honeypots/nets and having read through Know Your Enemy(honeynet project) and Tracking Hackers(Lance Spitzner). Both were full of great information but this book really lays out the what it takes to have a succeful honeypot and gives step by step instructions on how to set up a few different types. Its easy to read for a beginner, and easy to follow. It's also the only good guide to honeypots on the Windows side, and as a bonus all of the tools and information are current, as it was published this year(2005).
5.0 out of 5 stars Windows Support at Last! June 9 2014
By Katherine Fournier - Published on Amazon.com
Format:Paperback|Verified Purchase
This book provides much more detailed information on various security tools that operate natively in Windows. It provides a good baseline of understanding fpr novices as well as details on how to effectively use tools installed on a honeypot
2 of 3 people found the following review helpful
5.0 out of 5 stars Excellent source for Win32 honeypots April 18 2005
By Lance Spitzner - Published on Amazon.com
Honeypots are an exciting technology with tremendous potential for the security community. However, one of their limitations has been they have primarily been Unix based. Roger does an outstanding job of addressing this issue, bringing them into the Windows community.

Look for similar items by category