Amazon cover image
Image from Amazon.com

Reverse deception: organized cyber threat counter-exploitation Bodmer, Sean

By: Contributor(s): Material type: TextTextPublication details: New Delhi Tata McGraw Hill Education Private Limited 2012Description: xlvi, 418 pISBN:
  • 9781259061011
Subject(s): DDC classification:
  • 658.478 B6R3
Summary: Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. - Establish the goals and scope of your reverse deception campaign - Identify, analyze, and block APTs - Engage and catch nefarious individuals and their organizations - Assemble cyber-profiles, incident analyses, and intelligence reports -Uncover, eliminate, and autopsy crimeware, trojans, and botnets -Work with intrusion detection, anti-virus, and digital forensics tools -Employ stealth honeynet, honeypot, and sandbox technologies -Communicate and collaborate with legal teams and law enforcement
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Book Book Ahmedabad Non-fiction 658.478 B6R3 (Browse shelf(Opens below)) Available 182117
Total holds: 0


Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.

- Establish the goals and scope of your reverse deception campaign
- Identify, analyze, and block APTs
- Engage and catch nefarious individuals and their organizations
- Assemble cyber-profiles, incident analyses, and intelligence reports
-Uncover, eliminate, and autopsy crimeware, trojans, and botnets
-Work with intrusion detection, anti-virus, and digital forensics tools
-Employ stealth honeynet, honeypot, and sandbox technologies
-Communicate and collaborate with legal teams and law enforcement

There are no comments on this title.

to post a comment.

Powered by Koha