Honeypots for Database Attack Detection
Deception Technology — Using Decoys to Detect Threats
Core concept underlying honeypot-based detection techniques.Database Honeypots and Decoy Databases — Rapid7
Provides a practical explanation of honeypots in database security.Database Honeypot — Fortinet
Industry-level reference explaining honeypot usage in detecting attacks.Chris Sanders, Intrusion Detection Honeypots: Detection through Deception, Applied Network Defense.
Focuses on detection mechanisms using honeypots.David Litchfield et al., The Database Hacker's Handbook: Defending Database Servers, Wiley.
Covers database attack techniques and defensive strategies.