MOMENTAN AUSVERKAUFT

Reverse Deception: Organized Cyber Threat Counter-Exploitation by Gregory Carpenter, Jade Jones, Sean M. Bodmer and Max Kilger (2012, Trade Paperback)

Über dieses Produkt

Product Identifiers

PublisherMcgraw-Hill Education
ISBN-100071772499
ISBN-139780071772495
eBay Product ID (ePID)111877830

Product Key Features

Number of Pages464 Pages
Publication NameReverse Deception: Organized Cyber Threat Counter-Exploitation
LanguageEnglish
Publication Year2012
SubjectNetworking / General, Security / Viruses & Malware, Security / General, Security / Networking
TypeTextbook
AuthorGregory Carpenter, Jade Jones, Sean M. Bodmer, Max Kilger
Subject AreaComputers
FormatTrade Paperback

Dimensions

Item Height0.9 in
Item Weight28.1 Oz
Item Length9.2 in
Item Width7.5 in

Additional Product Features

Intended AudienceTrade
LCCN2012-026241
Dewey Edition23
IllustratedYes
Dewey Decimal005.8
Table Of ContentCh 1. Introduction Ch 2. Deception Throughout History to Today Ch 3. The Applications & Goals of Cyber Counterintelligence Ch 4. The Missions and Outcomes of Criminal Profiling Ch 5. Legal & Ethical Aspects of Deception Ch 6. Attack Tradecraft Ch 7. Operational Deception Ch 8. Tools, Tactics & Procedures Ch 9. Attack Attribution Ch 10. Black Hat Motivators Ch 11. Understanding Advanced Persistent Threats Ch 12. When To & When Not To Act Ch 13. Implementation & Validation Tactics References Appendices
SynopsisThis is the first book dedicated to understanding and fighting advanced persistent threats, today's most pernicious, most feared, but least understood risk to enterprise security., Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."-- Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. Establish the goals and scope of your reverse deception campaign Identify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnets Work with intrusion detection, anti-virus, and digital forensics tools Employ stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement
LC Classification NumberTK5105.59