Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Honeypot technologies and their applicability as a strategic internal countermeasure
Craig Valli
International Journal of Information and Computer Security (IJICS), 2007 Vol.1 No.4, pp.430 - 436
18 + 6 =

Thank you for your feedback.