Aggressive Network Self-defense by Neil R. WylerAggressive Network Self-defense by Neil R. Wyler

Aggressive Network Self-defense

byNeil R. WylerEditorNeil R. Wyler

Paperback | February 12, 2005

Pricing and Purchase Info

$72.15 online 
$75.95 list price save 5%
Earn 361 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker.

*First book to demonstrate and explore controversial network strike back and countermeasure techniques.

*Provides tightly guarded secrets to find out WHO is really attacking you over the internet.

*Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.
Neil R. Wyler (JNCIS-FWV, JNCIA-SSL) is an Information Security Engineer and Researcher located on the Wasatch Front in Utah. He is the co-owner of two Utah-based businesses, which include a consulting firm with clients worldwide and a small software start-up. He is currently doing contract work for Juniper Networks, working with the c...
Loading
Title:Aggressive Network Self-defenseFormat:PaperbackDimensions:560 pages, 9 × 6 × 0.68 inPublished:February 12, 2005Publisher:Syngress PublishingLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:1931836205

ISBN - 13:9781931836203

Look for similar items by category:

Reviews

Table of Contents

Introduction:
What's in a hat?
Chapter 1: Is it Legal to Strike Back?
Chapter 2: Automated Strike Back Worms
Chapter 3: Targeting an Attacking Host
Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets
Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns
Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This!
Chapter 11: When Enough is Enough