3 Implementation of Honeypot, NIDs, and HIDs Technologies in SOC Environment | part of Implementing Enterprise Cybersecurity with Open-Source Software and Standard Architecture | River Publishers books | IEEE Xplore