Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Results found: 1

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  honeypot working
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
1
Publication available in full text mode
Content available

Honeypot

100%
Współczesna Gospodarka
|
2011
|
vol. 2
|
issue 1
13-22
EN
In the article, the principles of computer network protection using the honeypot technology were presented. Honeypots are systems of traps, which are a powerful weapon in the hands of IT security specialists. The author described types and concepts of operation of honeypots.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.