Reverse deception : organized cyber threat counter-exploitation / Max Kilger [and threee others].
Material type:
- 9780071772495
- TK 5105.59 .R48 2012

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Digital Forensic | GC TK 5105.59 .R48 2012 c.1 (Browse shelf(Opens below)) | c.1 | Available | NULIB000008293 | ||
![]() |
National University - Manila | LRC - Main General Circulation | Digital Forensic | GC TK 5105.59 .R48 2012 c.2 (Browse shelf(Opens below)) | c.2 | Available | NULIB000008363 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Digital Forensic Close shelf browser (Hides shelf browser)
![]() |
![]() |
No cover image available |
![]() |
![]() |
![]() |
![]() |
||
GC TK 5105.59 .C66 2010 c.1 Computer forensics : investigating network intrusions and cybercrime. | GC TK 5105.59 .C66 2010 c.2 Computer forensics : investigating network intrusions and cybercrime. | GC TK 5105.59 .M33 2021 Infosec strategies and best practices : gain proficiency in information security using expert-level strategies and best practices / | GC TK 5105.59 .R48 2012 c.1 Reverse deception : organized cyber threat counter-exploitation / | GC TK 5105.59 .R48 2012 c.2 Reverse deception : organized cyber threat counter-exploitation / | GC TK 5105.59 .S54 2014 c.1 Anti-hacker tool kit / | GC TK 5105.59 .S54 2014 c.2 Anti-hacker tool kit / |
Includes index.
Ch 1. Introduction -- Ch 2. Deception Throughout History to Today -- Ch 3. The Applications & Goals of Cyber Counterintelligence -- Ch 4. The Missions and Outcomes of Criminal Profiling -- Ch 5. Legal & Ethical Aspects of Deception -- Ch 6. Attack Tradecraft -- Ch 7. Operational Deception -- Ch 8. Tools, Tactics & Procedures -- Ch 9. Attack Attribution -- Ch 10. Black Hat Motivators -- Ch 11. Understanding Advanced Persistent Threats -- Ch 12. When To & When Not To Act -- Ch 13. Implementation & Validation
In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. Establish the goals and scope of your reverse deception campaign Identify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnets Work with intrusion detection, anti-virus, and digital forensics tools Employ stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement.
There are no comments on this title.