AGGRESSIVE NETWORK SELF-DEFENSE

AGGRESSIVE NETWORK SELF-DEFENSE

AGGRESSIVE NETWORK SELF-DEFENSE

VV.AA.

42,21 €
IVA incluido
No disponible
Editorial:
***VARIAS***
Materia
Informática en inglés
Ubicación
A1-3112
ISBN:
978-1-931836-20-3
42,21 €
IVA incluido
No disponible
Añadir a favoritos

Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strikeback and active defense techniques. Follow the travails of eight system administrators who take cyber law into their own hands. See chillingly realistic examples of everything from a PDA to the MD5 hash being used as weapons in cyber dog fights. There is a certain satisfaction for me in seeing this book published. When I presented my strikeback concept to the security community years ago, I was surprised by the ensuing criticism from my peers. I thought they would support our right to defend ourselves, and that the real challenge would be educating the general public. It was the other way around, however. This is why I`m happy to see Aggressive Network SelfDefense published. It shows that people are beginning to consider the reality of today`s internet. Many issues are not black and white, right or wrong, legal or illegal. Some of the strikeback approaches in this book I support. Others, I outright disagree with. But that`s goodit gives us the chance to truly think about each situationand thinking is the most important part of the security business. Now is the time to analyze the technologies and consider the stories presented in this book before fiction becomes reality.Timothy M. Mullen, CIO and Chief Software Architect for AnchorIS.Com When the Worm Turns... Analyze the technical and legal implications of neutralizing machines that propagate malicious worms across the Internet. Are You the Hunter or the Hunted? Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences. Reverse Engineer Working Trojans, Viruses, and Keyloggers Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker. To Catch a Thief... Track stolen software as it propagates through peertopeer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced. Learn the Definition of Hostile Corporate Takeover in Cyberspace Find out who will own the fictional Primulus Corporation as attacker and defender wage war. Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation. See What Can Happen when the Virtual World Meets the Real World Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than postit notes. Where the Wild Things Are... Follow along as a reallife inthewild format string bug is morphed into strikeback code that launches a listening shell on the attacker`s own machine. Implement Passive StrikeBack Technologies Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.

Artículos relacionados

  • IOS 10 PROGRAMMING FUNDAMENTALS WITH SWIFT
    MATT NEUBURG
    Agotado

    57,30 €

  • QUANTUM COMPUTING FOR COMPUTER SCIENTISTS
    YANOFSKY, NOSON S
    No disponible

    107,55 €

  • BIG DATA
    MAYER-SCHÖNBERGER, VIKTOR
    A New York Times bestseller. Longlisted for the Financial Times/Goldman Sachs Business Book of the Year Award. Since Aristotle, we have fought to understand the causes behind everything. But this ideology is fading. In the age of big data, we can crunch an incomprehensible amount of information, providing us with invaluable insights about the what rather than the why. We're jus...
    No disponible

    23,00 €

  • THE CORE IOS DEVELOPER'S COOKBOOK
    SADUN, ERICA / WARDWELL, RICH
    Agotado

    48,75 €

  • DRIVEN BY DATA SCIENCE
    FOREMAN, JOHN
    No disponible

    55,00 €

  • FLIE SYSTEM FORENSIC ANALYSIS
    CARRIER, BRIAN
    Most digital evidence is stored within the computer`s file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file syst...
    No disponible

    54,28 €