Reverse Deception Organized Cyber Threat Counter-Exploitation

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Reverse Deception Organized Cyber Threat Counter-Exploitation by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones, McGraw-Hill Companies,Inc.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones ISBN: 9780071772501
Publisher: McGraw-Hill Companies,Inc. Publication: June 29, 2012
Imprint: Language: English
Author: Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
ISBN: 9780071772501
Publisher: McGraw-Hill Companies,Inc.
Publication: June 29, 2012
Imprint:
Language: English

A complete guide to understanding and fighting advanced persistent threats—today's most destructive risk to enterprise security

Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize them according to risk level, and prioritize your actions accordingly by applying expert, field-tested private- and government-sector methods (NSA, FBI, and DOD).

APTs cannot be seen, spread invisibly, and then continue to live in an enterprise network, undetected. In this one-of-a-kind book, the authors explain how to get—and stay—ahead of today's well-organized and extremely persistent brand of network enemies. The book describes the characteristics of malware and botnets, how they can morph, evade detection, and spin off decoys that live in-network, while appearing to have been cleaned up and debugged. This detailed guide then reveals how to detect the appearance of malicious code, decode the types of enemies they originate from, and finally, how to extricate malcode and deflect its future entry into networks.

Reverse Deception: Organized Cyber Threat Counter-Exploitation features:

  • Full coverage of the #1 feared type of network attack today, the APT
  • Descriptions of cyber espionage tactics seen in the U.S. and internationally, with comparisons of the types of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa
  • Enthralling case studies and true stories from the authors' FBI, DOD, NSA, and private sector work
  • Foreword by Fred Feer, a security professional with 40 years’ experience with the U.S. Army counterintelligence, CIA, RAND, and independent consulting
  • Complete coverage of key aspects of deception, counter-deception, behavioral profiling, and security within the cyber realm
  • Cat-and-mouse strategies from the best in the game—explains how to implement deception and disinformation techniques against a variety of incoming threats aimed at enticing adversaries out into the open
  • A fresh perspective on innovative, field-tested ideas for successfully countering current digital threats—plus expected characteristics of the next threats to come
  • Legal explanations of capabilities, limitations, and requirements for assisting law enforcement investigations

Coverage includes:
Deception Throughout History to Today; The Applications & Goals of Cyber Counterintelligence; The Missions and Outcomes of Criminal Profiling; Legal & Ethical Aspects of Deception; Attack Tradecraft; Operational Deception; Tools, Tactics & Procedures; Attack Attribution; Black Hat Motivators; Understanding Advanced Persistent Threats; When & When Not to Act; Implementation & Validation Tactics

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A complete guide to understanding and fighting advanced persistent threats—today's most destructive risk to enterprise security

Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize them according to risk level, and prioritize your actions accordingly by applying expert, field-tested private- and government-sector methods (NSA, FBI, and DOD).

APTs cannot be seen, spread invisibly, and then continue to live in an enterprise network, undetected. In this one-of-a-kind book, the authors explain how to get—and stay—ahead of today's well-organized and extremely persistent brand of network enemies. The book describes the characteristics of malware and botnets, how they can morph, evade detection, and spin off decoys that live in-network, while appearing to have been cleaned up and debugged. This detailed guide then reveals how to detect the appearance of malicious code, decode the types of enemies they originate from, and finally, how to extricate malcode and deflect its future entry into networks.

Reverse Deception: Organized Cyber Threat Counter-Exploitation features:

Coverage includes:
Deception Throughout History to Today; The Applications & Goals of Cyber Counterintelligence; The Missions and Outcomes of Criminal Profiling; Legal & Ethical Aspects of Deception; Attack Tradecraft; Operational Deception; Tools, Tactics & Procedures; Attack Attribution; Black Hat Motivators; Understanding Advanced Persistent Threats; When & When Not to Act; Implementation & Validation Tactics

More books from McGraw-Hill Companies,Inc.

Cover of the book Applied Value Investing, Conclusion: by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book Calculus Demystified 2/E by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book The McGraw-Hill Homeland Security Handbook : The Definitive Guide for Law Enforcement, EMT, and all other Security Professionals: The Definitive Guide for Law Enforcement, EMT, and all other Security Professionals by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book SSCP Systems Security Certified Practitioner All-in-One Exam Guide by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book Algebra Demystified 2/E by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book The Six Sigma Handbook, Third Edition, Chapter 5 - Project Management Using DMAIC and DMADV by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book Lean Six Sigma for Supply Chain Management, Appendix II - Key Lean Six Sigma Concepts by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book Chemistry Demystified 2/E by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 14 - Nonparametric Statistics by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book Break Free with DB2 9.7: A Tour of Cost-Slashing New Features by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book Six Sigma Business Scorecard, Chapter 3 - Need for the Six Sigma Business Scorecard by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book PowerShell for Microsoft SharePoint 2010 Administrators by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 5 - How to Determine, Analyze, and Interpret Your Samples by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book 2-The Problems with Project Management by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
Cover of the book Six Sigma Business Scorecard, Chapter 2 - Six Sigma--An Overview by Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff Jones
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy