
Reverse Deception
Organized Cyber Threat Counter-Exploitation
By: Sean M. Bodmer, Max Kilger, Gregory Carpenter
Paperback | 24 July 2012 | Edition Number 1
At a Glance
Paperback
$89.80
Aims to ship in 10 to 15 business days
When will this arrive by?
Enter delivery postcode to estimate
A complete guide to understanding and fighting advanced persistent threats-today's most destructive risk to enterprise security
Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize them according to risk level, and prioritize your actions accordingly by applying expert, field-tested private- and government-sector methods (NSA, FBI, and DOD).
APTs cannot be seen, spread invisibly, and then continue to live in an enterprise network, undetected. In this one-of-a-kind book, the authors explain how to get-and stay-ahead of today's well-organized and extremely persistent brand of network enemies. The book describes the characteristics of malware and botnets, how they can morph, evade detection, and spin off decoys that live in-network, while appearing to have been cleaned up and debugged. This detailed guide then reveals how to detect the appearance of malicious code, decode the types of enemies they originate from, and finally, how to extricate malcode and deflect its future entry into networks.
Reverse Deception: Organized Cyber Threat Counter-Exploitation features:
- Full coverage of the #1 feared type of network attack today, the APT
- Descriptions of cyber espionage tactics seen in the U.S. and internationally, with comparisons of the types of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa
- Enthralling case studies and true stories from the authors' FBI, DOD, NSA, and private sector work
- Foreword by Fred Feer, a security professional with 40 years' experience with the U.S. Army counterintelligence, CIA, RAND, and independent consulting
- Complete coverage of key aspects of deception, counter-deception, behavioral profiling, and security within the cyber realm
- Cat-and-mouse strategies from the best in the game-explains how to implement deception and disinformation techniques against a variety of incoming threats aimed at enticing adversaries out into the open
- A fresh perspective on innovative, field-tested ideas for successfully countering current digital threats-plus expected characteristics of the next threats to come
- Legal explanations of capabilities, limitations, and requirements for assisting law enforcement investigations
Coverage includes:
Deception Throughout History to Today; The Applications & Goals of Cyber Counterintelligence; The Missions and Outcomes of Criminal Profiling; Legal & Ethical Aspects of Deception; Attack Tradecraft; Operational Deception; Tools, Tactics & Procedures; Attack Attribution; Black Hat Motivators; Understanding Advanced Persistent Threats; When & When Not to Act; Implementation & Validation Tactics
ISBN: 9780071772495
ISBN-10: 0071772499
Series: Networking & Communication - OMG
Published: 24th July 2012
Format: Paperback
Language: English
Number of Pages: 464
Audience: General Adult
Publisher: OSBORNE
Country of Publication: US
Edition Number: 1
Dimensions (cm): 24.13 x 19.68 x 2.54
Weight (kg): 0.77
Shipping
Standard Shipping | Express Shipping | |
---|---|---|
Metro postcodes: | $9.99 | $14.95 |
Regional postcodes: | $9.99 | $14.95 |
Rural postcodes: | $9.99 | $14.95 |
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In
This product is categorised by
- Non-FictionComputing & I.T.Computer SecurityComputer Viruses
- Non-FictionComputing & I.T.Computer Networking & CommunicationsNetwork Security
- Non-FictionComputing & I.T.Information Technology General Issue
- Non-FictionComputing & I.T.Computer SecurityData Encryption
- Non-FictionComputing & I.T.Computer Programming & Software DevelopmentNetwork Programming