and i want further use honeypot for detect attack and overcome from it,
Reply
Thanks
I would suggest you work with your company's Chief Security Officer or
other member of your security staff for this type of information. If you
are without access to these individuals to address your questions you may
want to turn to the CISSP common body of knowledge for in-depth
information on these topics.
James Pulley
CTO, NewCOE Performance Engineering
> --
> ~~~~~
> Register to attend Cloud Slam 2012 Cloud Conference
> http://cloudslam.eventbrite.com
>
> Posting guidelines: http://bit.ly/bL3u3v
> Follow us on Twitter @cloudcomp_group @cloudslam @up_con
> Post Job/Resume at http://cloudjobs.net
>
> Download hundreds of recorded cloud sessions at
> - http://cloudslam.org/register
> - http://up-con.com/register
> - http://cloudslam09.com/content/registration-5.html
> - http://cloudslam10.com/content/registration
>
> or get it on DVD at
> http://www.amazon.com/gp/product/B002H07SEC,
> http://www.amazon.com/gp/product/B004L1755W,
> http://www.amazon.com/gp/product/B002H0IW1U
>
> ~~~~~
> You received this message because you are subscribed to the Google Groups
> "Cloud Computing" group.
> To post to this group, send email to cloud-c...@googlegroups.com
> To unsubscribe from this group, send email to
> cloud-computi...@googlegroups.com
>
-- Gabriel Pugliese | |
+55 11 9374-2720 http://www.blogcloud.com.br |
--
~~~~~
Register to attend Cloud Slam 2012 Cloud Conference