Description:A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses honeypots from a variety of perspectives. Case studies enhance the practical understanding of the subject along with strong theoretical foundation. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets and honeyfarms. Topics include denial of service, virus, worms, phishing, and elaborates on virtual honeypots and forensics. Practical implementations as well as current state of research are discussed.