Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
In-depth counterintelligence tactics to fight cyber-espionage
"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot
Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Sean M. Bodmer CISSP® CEH® Sean M. Bodmer is Director of Federal and Military Programs at Savid Corporation, Inc. Sean is an active Honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Most notably he has spent several years leading the operations and analysis of advanced intrusion detection systems (honeynets) where the motives and intent of attackers and their tools can be captured and analyzed in order to generate actionable intelligence to further protect customer networks. Sean has worked in various Systems Security Engineering roles for various federal government entities and private corporations over the past decade in the Washington D.C. Metro area. Sean has lectured across the United States at industry conferences such as DEFCON, PhreakNIC, DC3, NW3C, Carnegie Mellon CERT, and the Pentagon Security Forum all covering the aspects of attack and attacker assessment profiling in order to identify the true motivations and intent behind cyber attacks.
Gregory Carpenter, CISM, has earned numerous professional awards including the Joint Task Force for Global Network Operations Officer of the Quarter, recognition in the Who's Who in International Business, and serves on the U.S. Government's Cross Domain Solution Working Group, the Joint Wireless Working Group, and many others. As Team Chief of Information Operations, He develops plans and oversees the use of full -spectrum Information Operations which includes Computer Network Operations, Electronic Warfare, Operations Security, Psychological Operation and Military Deception in support of military and National Objectives. He develops, reviews and proposes Military Operational and & National Policy strategies for Cyber Operations. He has received numerous professional awards, including the prestigious National Security Agency Military Performer of the Year in 2007 and the Joint Task Force for Global Network Operations Officer of the Quarter, 2nd Qtr 2006. He was recognized in Who’s Who in International Business in 1997 the same year he was the 1st US Army Non-Commissioned officer of the Year (1st Runner-up).
Jade Anton Jones, J.D., has 15 years practice experience: areas of expertise include Information Operations and Space Law. He is a civilian with the Department of Defense and a Navy JAG Commander in the Reserves.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 18,00 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiEUR 11,62 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: Better World Books, Mishawaka, IN, U.S.A.
Condizione: As New. 1st Edition. Used book that is in almost brand-new condition. Codice articolo 51954991-6
Quantità: 1 disponibili
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. 1st Edition. Used book that is in clean, average condition without any missing pages. Codice articolo 9766010-6
Quantità: 1 disponibili
Da: SecondSale, Montgomery, IL, U.S.A.
Condizione: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Codice articolo 00079926724
Quantità: 3 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers. Codice articolo 14322042-5
Quantità: 5 disponibili
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. Reverse Deception: Organized Cyber Threat Counter-Exploitation 1.7. Book. Codice articolo BBS-9780071772495
Quantità: 5 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition. Codice articolo 14322042
Quantità: 1 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 14322042-n
Quantità: 1 disponibili
Da: moluna, Greven, Germania
Condizione: New. This is the first book dedicated to understanding and fighting advanced persistent threats, today s most pernicious, most feared, but least understood risk to enterprise security.This is the first book dedicated to understanding and fighting advanced pe. Codice articolo 5888021
Quantità: Più di 20 disponibili
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
Paperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 549. Codice articolo C9780071772495
Quantità: Più di 20 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: New. Codice articolo 14322042-n
Quantità: 1 disponibili