Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
In-depth counterintelligence tactics to fight cyber-espionage
"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot
Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.
Establish the goals and scope of your reverse deception campaignIdentify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnetsWork with intrusion detection, anti-virus, and digital forensics toolsEmploy stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement
- ISBN10 661371626X
- ISBN13 9786613716262
- Publish Date 25 June 2012 (first published 1 January 2012)
- Publish Status Active
- Out of Print 11 July 2012
- Publish Country US
- Imprint Not Avail
- Format eBook
- Pages 465
- Language English