Cantitate/Preț
Produs

Aggressive Network Self-Defense

Autor Neil R. Wyler
en Limba Engleză Paperback – 11 apr 2005
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker.

*First book to demonstrate and explore controversial network strike back and countermeasure techniques.

*Provides tightly guarded secrets to find out WHO is really attacking you over the internet.

*Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.
Citește tot Restrânge

Preț: 36792 lei

Preț vechi: 45990 lei
-20% Nou

Puncte Express: 552

Preț estimativ în valută:
7041 7314$ 5849£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781931836203
ISBN-10: 1931836205
Pagini: 560
Dimensiuni: 152 x 229 x 25 mm
Greutate: 0.65 kg
Editura: ELSEVIER SCIENCE

Public țintă

Any network administrator or security professional who has read any of the books which teach them how to passively defend their network against malicious, criminal hackers but now wants to take matters into their own hands.

Cuprins

Introduction:
What's in a hat?
Chapter 1: Is it Legal to Strike Back?
Chapter 2: Automated Strike Back Worms
Chapter 3: Targeting an Attacking Host
Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets
Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns
Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This!
Chapter 11: When Enough is Enough