Reverse Deception: Organized Cyber Threat Counter-Exploitation (häftad)
Format
Häftad (Paperback)
Språk
Engelska
Antal sidor
464
Utgivningsdatum
2012-08-14
Upplaga
ed
Förlag
OSBORNE/MCGRAW
Medarbetare
Kilger, Dr. Max / Carpenter, Gregory / Jones, Jade / Jones, Jeff R.
Illustrationer
ill
Dimensioner
231 x 185 x 25 mm
Vikt
772 g
Antal komponenter
1
ISBN
9780071772495

Reverse Deception: Organized Cyber Threat Counter-Exploitation

Häftad,  Engelska, 2012-08-14
455
  • Skickas från oss inom 3-6 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your networks vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.
  • Establish the goals and scope of your reverse deception campaign
  • Identify, analyze, and block APTs
  • Engage and catch nefarious individuals and their organizations
  • Assemble cyber-profiles, incident analyses, and intelligence reports
  • Uncover, eliminate, and autopsy crimeware, trojans, and botnets
  • Work with intrusion detection, anti-virus, and digital forensics tools
  • Employ stealth honeynet, honeypot, and sandbox technologies
  • Communicate and collaborate with legal teams and law enforcement
Visa hela texten

Passar bra ihop

  1. Reverse Deception: Organized Cyber Threat Counter-Exploitation
  2. +
  3. Co-Intelligence

De som köpt den här boken har ofta också köpt Co-Intelligence av Ethan Mollick (häftad).

Köp båda 2 för 645 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av författarna

Övrig information

Sean M. Bodmer, CISSP, CEH, is a senior threat intelligence analyst at Damballa, Inc., a crimeware detection, security provider, and research firm consulting to Fortune 500 and 1,000 companies. He analyzes and tracks thousands of strings of network activity each week, scanning for malicious activity and focuses on attribution of each criminal and campaign. Sean is a frequent speaker on network security concepts and practices, including at DoD conferences, and has been invited to speak and train cyber counterintelligence courses around the world. He's the co-author of Hacking Exposed: Malware & Rootkits. Max Kilger, Ph.D., is specialist in profiling and behavioral analysis of the black hat community and hackers. He is a founding member of the Honeynet Project, is currently on their board of directors, and serves as their chief membership officer and chief profiler. Dr. Kilger is a frequent national and international speaker to the intelligence community, military, federal law enforcement, and information security forums. He received his doctorate from Stanford University in Social Psychology in 1993. Gregory Carpenter, CISM, Jade Jones, JD, Jeffrey R. Jones, CISSP, GCIH, and C|EH (Washington, D.C.) has more than 20 years of experience as a government intelligence and cyber threat analyst. He has held several positions within the Department of Defense, most recently focusing on the the US Army's vulnerabilities and capabilities in cyberspace. Jeff holds a B.S. in Computer Science (Texas A&M - Corpus Christi) and an M.S. in Computer Science with an emphasis in Information Security (James Madison University). He has published articles on cyber threats and espionage in the National Intelligence Journal and various trade publications.

Innehållsförteckning

Ch 1. Introduction
Ch 2. Deception Throughout History to Today
Ch 3. The Applications & Goals of Cyber Counterintelligence
Ch 4. The Missions and Outcomes of Criminal Profiling
Ch 5. Legal & Ethical Aspects of Deception
Ch 6. Attack Tradecraft
Ch 7. Operational Deception
Ch 8. Tools, Tactics & Procedures
Ch 9. Attack Attribution
Ch 10. Black Hat Motivators
Ch 11. Understanding Advanced Persistent Threats
Ch 12. When To & When Not To Act
Ch 13. Implementation & Validation Tactics
References
Appendices