Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2011 | 2 | 1 | 13-22

Article title

Honeypot

Authors

Content

Title variants

EN
HONEYPOT

Languages of publication

PL

Abstracts

EN
In the article, the principles of computer network protection using the honeypot technology were presented. Honeypots are systems of traps, which are a powerful weapon in the hands of IT security specialists. The author described types and concepts of operation of honeypots.

Year

Volume

2

Issue

1

Pages

13-22

Physical description

Contributors

author
  • Uniwersytet Gdański, Wydział Ekonomiczny, Instytut Transportu i Handlu Morskiego, ul. Armii Krajowej 119/121, 81-824 Sopot, Poland.

References

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.cejsh-22b2389b-a267-49f2-aa24-6829073a7736
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.