Reverse Deception
(Sprache: Englisch)
This is the first book dedicated to understanding and fighting advanced persistent threats, today's most pernicious, most feared, but least understood risk to enterprise security.
Leider schon ausverkauft
versandkostenfrei
Buch
34.23 €
Produktdetails
Produktinformationen zu „Reverse Deception “
This is the first book dedicated to understanding and fighting advanced persistent threats, today's most pernicious, most feared, but least understood risk to enterprise security.
Klappentext zu „Reverse Deception “
In-depth counterintelligence tactics to fight cyber-espionage"A comprehensive and unparalleled overview of the topic by experts in the field."-- SlashdotExpose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.Establish the goals and scope of your reverse deception campaignIdentify, analyze, and block APTs
Engage and catch nefarious individuals and their organizations
Assemble cyber-profiles, incident analyses, and intelligence reports
Uncover, eliminate, and autopsy crimeware, trojans, and botnets
Work with intrusion detection, anti-virus, and digital forensics tools
Employ stealth honeynet, honeypot, and sandbox technologies
Communicate and collaborate with legal teams and law enforcement
Inhaltsverzeichnis zu „Reverse Deception “
Ch 1. IntroductionCh 2. Deception Throughout History to Today
Ch 3. The Applications & Goals of Cyber Counterintelligence
Ch 4. The Missions and Outcomes of Criminal Profiling
Ch 5. Legal & Ethical Aspects of Deception
Ch 6. Attack Tradecraft
Ch 7. Operational Deception
Ch 8. Tools, Tactics & Procedures
Ch 9. Attack Attribution
Ch 10. Black Hat Motivators
Ch 11. Understanding Advanced Persistent Threats
Ch 12. When To & When Not To Act
Ch 13. Implementation & Validation Tactics
References
Appendices
Autoren-Porträt von Sean M. Bodmer, Max Kilger, Gregory S. Carpenter, Jeff R. Jones, Jade Jones
Sean M. Bodmer, CISSP, CEH, is a senior threat intelligence analyst at Damballa, Inc., a crimeware detection, security provider, and research firm consulting to Fortune 500 and 1,000 companies. He analyzes and tracks thousands of strings of network activity each week, scanning for malicious activity and focuses on attribution of each criminal and campaign. Sean is a frequent speaker on network security concepts and practices, including at DoD conferences, and has been invited to speak and train cyber counterintelligence courses around the world. He's the co-author of Hacking Exposed: Malware & Rootkits .
Bibliographische Angaben
- Autoren: Sean M. Bodmer , Max Kilger , Gregory S. Carpenter , Jeff R. Jones , Jade Jones
- 2012, 464 Seiten, mit Abbildungen, Maße: 18,8 x 23,3 cm, Kartoniert (TB), Englisch
- By Sean Bodmer, Max Kilger, Gregory Carpenter et al.
- Verlag: McGraw-Hill Professional
- ISBN-10: 0071772499
- ISBN-13: 9780071772495
- Erscheinungsdatum: 01.08.2012
Sprache:
Englisch
Kommentar zu "Reverse Deception"
0 Gebrauchte Artikel zu „Reverse Deception“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Reverse Deception".
Kommentar verfassen