ISBN-10:
1931836205
ISBN-13:
9781931836203
Pub. Date:
04/01/2005
Publisher:
Elsevier Science
Aggressive Network Self-Defense / Edition 1

Aggressive Network Self-Defense / Edition 1

Paperback

Current price is , Original price is $54.95. You
Select a Purchase Option (1st Edition)
  • purchase options
    $44.12 $54.95 Save 20% Current price is $44.12, Original price is $54.95. You Save 20%.
  • purchase options

Product Details

ISBN-13: 9781931836203
Publisher: Elsevier Science
Publication date: 04/01/2005
Edition description: 1st Edition
Pages: 560
Product dimensions: 0.86(w) x 7.00(h) x 10.00(d)

About the Author

Neil R. Wyler (JNCIS-FWV, JNCIA-SSL) is an Information Security Engineer and Researcher located on the Wasatch Front in Utah. He is the co-owner of two Utah-based businesses, which include a consulting firm with clients worldwide and a small software start-up. He is currently doing contract work for Juniper Networks, working with the company’s Security Products Group. Neil is a staff member of the Black Hat Security Briefings and Def Con hacker conference. He has spoken at numerous security conferences and been the subject of various online, print, film, and television interviews regarding different areas of information security. He was the Lead Author and Technical Editor of Aggressive Network Self-Defense (Syngress, 1-931836-20-5) and serves on the advisory board for a local technical college.

Table of Contents

Introduction:
What's in a hat?
Chapter 1: Is it Legal to Strike Back?
Chapter 2: Automated Strike Back Worms
Chapter 3: Targeting an Attacking Host
Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets
Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns
Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This!
Chapter 11: When Enough is Enough

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews

Aggressive Network Self-Defense 3 out of 5 based on 0 ratings. 1 reviews.
Guest More than 1 year ago
The book is riddled with sloppy prose that has not seen the attention of a careful editor. As only example (there are others), Chapter 12 repeatedly has phrases like 'the diagram in Figure 12.11'. This can be shortened to 'Figure 12.11', as is done in several places in that chapter. Speaking of figures, several in that chapter were poorly drawn. Blurry. And in some cases, graphics boxes within a figure are cut off by the border. Again, sloppy. Throughout the book, most figures are annoying. They are screen or window captures. The authors chose the quick and dirty way of doing this and then pasting them into the text. But the resolution of the resultant printed images makes the contents out of focus. Yes, perhaps if you squint hard enought and interpolate, you can deduce the text. But this is what I mean. Annoying. The chapters do offer amusing fictional plots that give tactics on both intruder and defender. Part of the appeal of the book is that these roles can switch. There are enough technical details supplied in the text to make the tactics credible to a computer person. The discussion on the limitations of MD5 to a crafted collisions attack is well done. Very sneaky. Though still quite speculative, as the text rightfully points out. The Strike Back chapter describes Armpit - a tool written as a 'human detector'. It is run as a daemon on a server. It permits access to resources only if the client browser can interpret Flash. This is seen as tantamount to implying that there is a human at the client, and not an automated attack tool, since most instances of the latter cannot do Flash. But this just begs the question. Surely if Armpit becomes common, it gives incentive for future attack tools to be able to run Flash? The narrative gives no technical reason why a cracker cannot take this logical countermeasure. More importantly, the book fails to recognise that Armpit is a challenge-response method. Those of you familiar with antispam ideas should realise this immediately. Plus, Mailblocks has a patent on challenge-response. It would have been useful for the book to discuss whether this patent (or any others) could make any infringement claims against the company that wrote Armpit.