|
Showing 1 - 2 of
2 matches in All Departments
Publisher's Note: Products purchased from Third Party sellers are
not guaranteed by the publisher for quality, authenticity, or
access to any online entitlements included with the product.
In-depth counterintelligence tactics to fight cyber-espionage "A
comprehensive and unparalleled overview of the topic by experts in
the field."--Slashdot Expose, pursue, and prosecute the
perpetrators of advanced persistent threats (APTs) using the tested
security techniques and real-world case studies featured in this
one-of-a-kind guide. Reverse Deception: Organized Cyber Threat
Counter-Exploitation shows how to assess your network's
vulnerabilities, zero in on targets, and effectively block
intruders. Discover how to set up digital traps, misdirect and
divert attackers, configure honeypots, mitigate encrypted
crimeware, and identify malicious software groups. The expert
authors provide full coverage of legal and ethical issues,
operational vetting, and security team management. Establish the
goals and scope of your reverse deception campaign Identify,
analyze, and block APTs Engage and catch nefarious individuals and
their organizations Assemble cyber-profiles, incident analyses, and
intelligence reports Uncover, eliminate, and autopsy crimeware,
trojans, and botnets Work with intrusion detection, anti-virus, and
digital forensics tools Employ stealth honeynet, honeypot, and
sandbox technologies Communicate and collaborate with legal teams
and law enforcement
Publisher's Note: Products purchased from Third Party sellers are
not guaranteed by the publisher for quality, authenticity, or
access to any online entitlements included with the product. Arm
yourself for the escalating war against malware and rootkits Thwart
debilitating cyber-attacks and dramatically improve your
organization's security posture using the proven defense strategies
in this thoroughly updated guide. Hacking Exposed (TM) Malware and
Rootkits: Security Secrets & Solutions, Second Edition fully
explains the hacker's latest methods alongside ready-to-deploy
countermeasures. Discover how to block pop-up and phishing
exploits, terminate embedded code, and identify and eliminate
rootkits. You will get up-to-date coverage of intrusion detection,
firewall, honeynet, antivirus, and anti-rootkit technology. * Learn
how malware infects, survives, and propagates across an enterprise
* See how hackers develop malicious code and target vulnerable
systems * Detect, neutralize, and remove user-mode and kernel-mode
rootkits * Use hypervisors and honeypots to uncover and kill
virtual rootkits * Defend against keylogging, redirect, click
fraud, and identity theft * Block spear phishing, client-side, and
embedded-code exploits * Effectively deploy the latest antivirus,
pop-up blocker, and firewall software * Identify and stop malicious
processes using IPS solutions
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|