did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780071827744

Hacking Back: Offensive Cyber Counterintelligence

by ; ; ;
  • ISBN13:

    9780071827744

  • ISBN10:

    0071827749

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2015-01-28
  • Publisher: McGraw-Hill Osborne Media
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $60.00
We're Sorry.
No Options Available at This Time.

Summary

Learn the concepts, methods, and implications of offensive cyber counterintelligence

Hacking Back: Offensive Cyber Counterintelligence is a look at cyber counterintelligence theory in a WikiLeaks world. The authors detail techniques—from phishing to sniffing and from attribution to takedown—all bolstered by case examples and rooted in the authors’ many years of in-the-trenches experience in trap-setting and detecting breaches. The book’s field notes—some from identified hackers, and some from anonymous hackers—consist of exciting, never-before-told case examples.

  • Details technically simple hacks, complex attacks, and famous network intrusions
  • Organized by methods so security practitioners can quickly find specific tactics and techniques
  • Dissects security breach scenarios, providing analyses of real-life operations from the authors’ many years of experience
  • Explains the US and EU cyber laws every savvy security practitioner defending against cybercrime should know

Table of Contents

Preface
Ch 1. Introduction
Ch 2. Deception Throughout History to Today
Ch 3. The Applications & Goals of Cyber Counterintelligence
Ch.4. The Missions and Outcomes of Criminal Profiling
Ch 5. Legal & Ethical Aspects of Deception
Ch 6. Attack Tradecraft
Ch.7. Operational Deception
Ch 8. Tools, Tactics & Procedures
Ch 9. Attack Attribution
Ch 10. Black Hat Motivators
Ch 11. Understanding Advanced Persistent Threats
Ch 12. When To & When Not To Act
Ch 13. Implementation & Validation Tactics
References
Appendices

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program