Evading IDS, Firewalls and Detecting Honeypots Publication Type: Book Chapter Authors: Source: Ethical hacking and countermeasures: Secure Network Operating Systems and Infrastructures, Cengage Learning, Boston, USA, p.77-134 (2016)