How to Hack Back Using Deception—Part 2
https://www.f5.com/labs/articles/cisotociso/how-to-hack-back-using-deception-part-2.html
Running list and bibliography of articles on cyber deception, honeypots, and canary tokens. Started as notes and discussion from my talk given at Toorcamp 2009.
No comments:
Post a Comment