Part I Deception Technologies & Threat Visibility – Honeypots and Security Operations | part of Implementing Enterprise Cybersecurity with Open-Source Software and Standard Architecture | River Publishers books | IEEE Xplore