Reverse Deception Organized Cyber Threat Counter-Exploitation PDF ePub eBook

Books Info:

Reverse Deception Organized Cyber Threat Counter-Exploitation free pdf In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. Establish the goals and scope of your reverse deception campaign Identify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnets Work with intrusion detection, anti-virus, and digital forensics tools Employ stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement

About Sean M. Bodmer

Sean M. Bodmer, CISSP, CEH, is Chief Researcher of Counter-Exploitation Intelligence at CounterTack, Inc. a next generation endpoint security firm. He analyzes and tracks thousands of strings of network activity each week, scanning for malicious activity and focuses on attribution of each criminal and campaign. Sean is a frequent speaker on network security concepts and practices, including at DoD conferences, and has been invited to speak and train cyber counterintelligence courses around the world. He's the co-author of Hacking Exposed: Malware

Details Book

Author : Sean M. Bodmer
Publisher : Osborne/McGraw-Hill
Data Published : 01 August 2012
ISBN : 0071772499
EAN : 9780071772495
Format Book : PDF, Epub, DOCx, TXT
Number of Pages : 464 pages
Age + : 15 years
Language : English
Rating :

Reviews Reverse Deception Organized Cyber Threat Counter-Exploitation



17 Comments Add a comment




Related eBooks Download


  • Official (ISC)2 Guide to the CCFP CBK free pdfOfficial (ISC)2 Guide to the CCFP CBK

    Cyber forensic knowledge requirements have expanded and evolved just as fast as the nature of digital information has-requiring cyber forensics professionals to understand far more than just hard drive intrusion analysis..


  • Official (ISC)2R Guide to the CCFP CBK free pdfOfficial (ISC)2R Guide to the CCFP CBK

    Cyber forensic knowledge requirements have expanded and evolved just as fast as the nature of digital information has-requiring cyber forensics professionals to understand far more than just hard drive intrusion analysis..


  • Official (ISC)2R Guide to the CCFP CBK free pdfOfficial (ISC)2R Guide to the CCFP CBK

    Cyber forensic knowledge requirements have expanded and evolved just as fast as the nature of digital information has-requiring cyber forensics professionals to understand far more than just hard drive intrusion analysis..


  • Cyber Warfare free pdfCyber Warfare

    Jason Andress and Steve Winterfeld cover how and why cyber war is waged. addressing the key issues in corporate and global cyber warfare. discussing real-world attempts by individuals and states to adversely affect the networks and computers of corporate players and other nations..


  • Cyber War free pdfCyber War

    Author of the #1 New York Times bestseller Against All Enemies. former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict-Cyber War..


  • Reverse Deception Organized Cyber Threat Counter-Exploitation free pdfReverse Deception Organized Cyber Threat Counter-Exploitation

    . In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetra