×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Reverse Deception Organized Cyber Threat Counter-Exploitation / Edition 1
     

Reverse Deception Organized Cyber Threat Counter-Exploitation / Edition 1

5.0 1
by Sean M. Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones
 

See All Formats & Editions

ISBN-10: 0071772499

ISBN-13: 9780071772495

Pub. Date: 07/27/2012

Publisher: McGraw-Hill Professional Publishing

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."—Slashdot

Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse

Overview

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."—Slashdot

Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.

  • Establish the goals and scope of your reverse deception campaign
  • Identify, analyze, and block APTs
  • Engage and catch nefarious individuals and their organizations
  • Assemble cyber-profiles, incident analyses, and intelligence reports
  • Uncover, eliminate, and autopsy crimeware, trojans, and botnets
  • Work with intrusion detection, anti-virus, and digital forensics tools
  • Employ stealth honeynet, honeypot, and sandbox technologies
  • Communicate and collaborate with legal teams and law enforcement

Product Details

ISBN-13:
9780071772495
Publisher:
McGraw-Hill Professional Publishing
Publication date:
07/27/2012
Pages:
464
Product dimensions:
19.00(w) x 9.10(h) x 1.10(d)

Related Subjects

Table of Contents

Ch 1. Introduction

Ch 2. Deception Throughout History to Today

Ch 3. The Applications & Goals of Cyber
Counterintelligence

Ch 4. The Missions and Outcomes of Criminal Profiling

Ch 5. Legal & Ethical Aspects of Deception

Ch 6. Attack Tradecraft

Ch 7. Operational Deception

Ch 8. Tools, Tactics & Procedures

Ch 9. Attack Attribution

Ch 10. Black Hat Motivators

Ch 11. Understanding Advanced Persistent Threats

Ch 12. When To & When Not To Act

Ch 13. Implementation & Validation Tactics

References

Appendices

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews

Reverse Deception Organized Cyber Threat Counter-Exploitation 5 out of 5 based on 0 ratings. 1 reviews.
Anonymous More than 1 year ago
Excellent book!