Millions of books in English, Spanish and other languages. Free UK delivery 

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Reverse Deception: Organized Cyber Threat Counter-Exploitation
Type
Physical Book
Year
2012
Language
English
Pages
418
Format
Paperback
Dimensions
23.1 x 18.5 x 2.5 cm
Weight
0.77 kg.
ISBN
0071772499
ISBN13
9780071772495
Edition No.
1

Reverse Deception: Organized Cyber Threat Counter-Exploitation

Sean Bodmer (Author) · Max Kilger (Author) · Gregory Carpenter (Author) · McGraw-Hill Companies · Paperback

Reverse Deception: Organized Cyber Threat Counter-Exploitation - Bodmer, Sean ; Kilger, Max ; Carpenter, Gregory

New Book

£ 40.69

  • Condition: New
Origin: U.S.A. (Import costs included in the price)
It will be shipped from our warehouse between Friday, June 28 and Wednesday, July 10.
You will receive it anywhere in United Kingdom between 1 and 3 business days after shipment.

Synopsis "Reverse Deception: Organized Cyber Threat Counter-Exploitation"

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.In-depth counterintelligence tactics to fight cyber-espionage"A comprehensive and unparalleled overview of the topic by experts in the field."--SlashdotExpose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. Establish the goals and scope of your reverse deception campaignIdentify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnetsWork with intrusion detection, anti-virus, and digital forensics toolsEmploy stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews