MARC details
000 -LEADER |
fixed length control field |
02595nam a2200253Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250618083914.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071772495 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK 5105.59 .R48 2012 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Bodmer, Sean |
Relator term |
author |
245 #0 - TITLE STATEMENT |
Title |
Reverse deception : |
Remainder of title |
organized cyber threat counter-exploitation / |
Statement of responsibility, etc. |
Max Kilger [and threee others]. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York : |
Name of publisher, distributor, etc. |
McGraw Hill Education, |
Date of publication, distribution, etc. |
c2012 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xlvi, 418 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Ch 1. Introduction -- Ch 2. Deception Throughout History to Today -- Ch 3. The Applications & Goals of Cyber Counterintelligence -- Ch 4. The Missions and Outcomes of Criminal Profiling -- Ch 5. Legal & Ethical Aspects of Deception -- Ch 6. Attack Tradecraft -- Ch 7. Operational Deception -- Ch 8. Tools, Tactics & Procedures -- Ch 9. Attack Attribution -- Ch 10. Black Hat Motivators -- Ch 11. Understanding Advanced Persistent Threats -- Ch 12. When To & When Not To Act -- Ch 13. Implementation & Validation |
520 ## - SUMMARY, ETC. |
Summary, etc. |
In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. Establish the goals and scope of your reverse deception campaign Identify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnets Work with intrusion detection, anti-virus, and digital forensics tools Employ stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
INFORMATION TECHNOLOGY -- SECURITY MEASURES |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kilger, Max |
Relator term |
co-author |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Carpenter, Gregory |
Relator term |
co-author |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Jones, Jade |
Relator term |
co-author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |