The Resource Reverse Deception: : Organized Cyber Threat Counter-Exploitation, Bodmer, Sean

Reverse Deception: : Organized Cyber Threat Counter-Exploitation, Bodmer, Sean

Label
Reverse Deception: : Organized Cyber Threat Counter-Exploitation
Title
Reverse Deception:
Title remainder
Organized Cyber Threat Counter-Exploitation
Statement of responsibility
Bodmer, Sean
Creator
Contributor
Author
Subject
Genre
Language
  • eng
  • eng
Summary
In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."-- Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. Establish the goals and scope of your reverse deception campaign Identify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnets Work with intrusion detection, anti-virus, and digital forensics tools Employ stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement
http://library.link/vocab/creatorName
Bodmer, Sean
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Kilger, Max
  • Carpenter, Gregory
  • Jones, Jade
  • O'Reilly Media Company
http://library.link/vocab/subjectName
  • Information technology
  • Computer security
  • Computer networks
  • Data protection
Label
Reverse Deception: : Organized Cyber Threat Counter-Exploitation, Bodmer, Sean
Link
https://databases.mvlc.org/connect/oreilly?ID=9780071772495
Instantiates
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Dimensions
unknown
Edition
1st edition
Extent
1 online resource (352 pages)
Form of item
online
Issuing body
Made available through: O'Reilly Media Company.
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Reproduction note
Electronic reproduction.
Specific material designation
remote
System control number
(CaSebORM)9780071772495
System details
Mode of access: World Wide Web
Label
Reverse Deception: : Organized Cyber Threat Counter-Exploitation, Bodmer, Sean
Link
https://databases.mvlc.org/connect/oreilly?ID=9780071772495
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Dimensions
unknown
Edition
1st edition
Extent
1 online resource (352 pages)
Form of item
online
Issuing body
Made available through: O'Reilly Media Company.
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Reproduction note
Electronic reproduction.
Specific material designation
remote
System control number
(CaSebORM)9780071772495
System details
Mode of access: World Wide Web

Library Locations

    • Merrimack Valley Library ConsortiumBorrow it
      4 High Street, Suite 175, North Andover, MA, 01845, US
      42.7009413 -71.1255084
Processing Feedback ...