Cover for Aggressive Network Self-Defense

Aggressive Network Self-Defense

Book2005

Edited by:

Neil Archibald, dedhed, ... Timothy M. Mullen (THOR)

Aggressive Network Self-Defense

Book2005

 

Cover for Aggressive Network Self-Defense

Edited by:

Neil Archibald, dedhed, ... Timothy M. Mullen (THOR)

Browse this book

Book description

Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such t ... read full description

Browse content

Table of contents

Actions for selected chapters

Select all / Deselect all

  1. Full text access
  2. Book chapterNo access

    Index

    Pages 373-383

About the book

Description

Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker.

Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker.

Key Features

*First book to demonstrate and explore controversial network strike back and countermeasure techniques.

*Provides tightly guarded secrets to find out WHO is really attacking you over the internet.

*Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.

*First book to demonstrate and explore controversial network strike back and countermeasure techniques.

*Provides tightly guarded secrets to find out WHO is really attacking you over the internet.

*Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.

Details

ISBN

978-1-931836-20-3

Language

English

Published

2005

Copyright

Copyright © 2005 Elsevier Inc. All rights reserved

Imprint

Syngress

You currently don’t have access to this book, however you can purchase separate chapters directly from the table of contents or buy the full version.

Purchase the book

Editors

Neil Archibald

Technical Editor

dedhed

Technical Editor

Seth Fogie

Technical Editor

Chris Hurley

Technical Editor

Dan Kaminsky

Technical Editor

Johnny Long

Technical Editor

Luke McOmie (aka Pyr0)

Technical Editor

Haroon Meer

Technical Editor

Bruce Potter

Technical Editor

Roelof Temmingh

Technical Editor

Neil R. Wyler (aka Grifter)

Technical Editor

Timothy M. Mullen (THOR)