Reverse deception : (Record no. 10534)

MARC details
000 -LEADER
fixed length control field 02595nam a2200253Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250618083914.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071772495
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK 5105.59 .R48 2012
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Bodmer, Sean
Relator term author
245 #0 - TITLE STATEMENT
Title Reverse deception :
Remainder of title organized cyber threat counter-exploitation /
Statement of responsibility, etc. Max Kilger [and threee others].
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. McGraw Hill Education,
Date of publication, distribution, etc. c2012
300 ## - PHYSICAL DESCRIPTION
Extent xlvi, 418 pages :
Other physical details illustrations ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Ch 1. Introduction -- Ch 2. Deception Throughout History to Today -- Ch 3. The Applications & Goals of Cyber Counterintelligence -- Ch 4. The Missions and Outcomes of Criminal Profiling -- Ch 5. Legal & Ethical Aspects of Deception -- Ch 6. Attack Tradecraft -- Ch 7. Operational Deception -- Ch 8. Tools, Tactics & Procedures -- Ch 9. Attack Attribution -- Ch 10. Black Hat Motivators -- Ch 11. Understanding Advanced Persistent Threats -- Ch 12. When To & When Not To Act -- Ch 13. Implementation & Validation
520 ## - SUMMARY, ETC.
Summary, etc. In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. Establish the goals and scope of your reverse deception campaign Identify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnets Work with intrusion detection, anti-virus, and digital forensics tools Employ stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element INFORMATION TECHNOLOGY -- SECURITY MEASURES
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Kilger, Max
Relator term co-author
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Carpenter, Gregory
Relator term co-author
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Jones, Jade
Relator term co-author
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Digital Forensic LRC - Main National University - Manila General Circulation 11/18/2014 Purchased - Amazon 56.52   GC TK 5105.59 .R48 2012 c.1 NULIB000008293 05/20/2025 c.1 05/20/2025 Books
    Library of Congress Classification     Digital Forensic LRC - Main National University - Manila General Circulation 11/18/2014 Purchased - Amazon 56.52   GC TK 5105.59 .R48 2012 c.2 NULIB000008363 06/18/2025 c.2 05/20/2025 Books