did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780071772495

Reverse Deception: Organized Cyber Threat Counter-Exploitation

by ; ; ;
  • ISBN13:

    9780071772495

  • ISBN10:

    0071772499

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2012-07-24
  • Publisher: McGraw-Hill Education

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $42.00 Save up to $14.70
  • Rent Book $27.30
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 24-48 HOURS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

A complete guide to understanding and fighting advanced persistent threatstoday's most destructive risk to enterprise security Reverse Deception: Organized Cyber Threat Counter-Exploitationexplains how to identify advanced persistent threats (APTs), categorize them according to risk level, and prioritize your actions accordingly by applying expert, field-tested private- and government-sector methods (NSA, FBI, and DOD). APTs cannot be seen, spread invisibly, and then continue to live in an enterprise network, undetected. In this one-of-a-kind book, the authors explain how to getand stayahead of today's well-organized and extremely persistent brand of network enemies. The book describes the characteristics of malware and botnets, how they can morph, evade detection, and spin off decoys that live in-network, while appearing to have been cleaned up and debugged. This detailed guide then reveals how to detect the appearance of malicious code, decode the types of enemies they originate from, and finally, how to extricate malcode and deflect its future entry into networks. Reverse Deception: Organized Cyber Threat Counter-Exploitationfeatures: Full coverage of the #1 feared type of network attack today, the APT Descriptions of cyber espionage tactics seen in the U.S. and internationally, with comparisons of the types of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa Enthralling case studies and true stories from the authors' FBI, DOD, NSA, and private sector work Foreword by Fred Feer, a security professional with 40 years' experience with the U.S. Army counterintelligence, CIA, RAND, and independent consulting Complete coverage of key aspects of deception, counter-deception, behavioral profiling, and security within the cyber realm Cat-and-mouse strategies from the best in the gameexplains how to implement deception and disinformation techniques against a variety of incoming threats aimed at enticing adversaries out into the open A fresh perspective on innovative, field-tested ideas for successfully countering current digital threatsplus expected characteristics of the next threats to come Legal explanations of capabilities, limitations, and requirements for assisting law enforcement investigations Coverage includes: Deception Throughout History to Today; The Applications & Goals of Cyber Counterintelligence; The Missions and Outcomes of Criminal Profiling; Legal & Ethical Aspects of Deception; Attack Tradecraft; Operational Deception; Tools, Tactics & Procedures; Attack Attribution; Black Hat Motivators; Understanding Advanced Persistent Threats; When & When Not to Act; Implementation & Validation Tactics

Table of Contents

Ch 1. Introduction
Ch 2. Deception Throughout History to Today
Ch 3. The Applications & Goals of Cyber Counterintelligence
Ch 4. The Missions and Outcomes of Criminal Profiling
Ch 5. Legal & Ethical Aspects of Deception
Ch 6. Attack Tradecraft
Ch 7. Operational Deception
Ch 8. Tools, Tactics & Procedures
Ch 9. Attack Attribution
Ch 10. Black Hat Motivators
Ch 11. Understanding Advanced Persistent Threats
Ch 12. When To & When Not To Act
Ch 13. Implementation & Validation Tactics
References
Appendices

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program