Электронная библиотека

ЭЛЕКТРОННАЯ БИБЛИОТЕКА






Добро пожаловать на сайт электронной библиотеки!
Здесь можно найти произведения русских и зарубежных авторов.
Скачать множество книг и журналов различных жанров и направлений.
Большой выбор художественной, бизнес, учебной и технической литературы.
Все представленные здесь книги и журналы имеют подробное описание и обложку.
Наша библиотека регулярно пополняется только новыми и интересными материалами!

«Подробнее о сайте»            «Правила сайта»            «Написать нам»            «Статьи»

Reverse Deception: Organized Cyber Threat Counter-Exploitation

Компьютерные >> Сетевые технологии





Разместил: Ingvar16

23-06-2016, 17:20

Просмотров: 173





Reverse Deception: Organized Cyber Threat Counter-Exploitation

Разоблачать, преследовать и привлекать к ответственности лиц, совершающих целевые кибератаки (APTs), используя проверенные техники безопасности и реальные тематические исследования, размещенные в этом единственном в своем роде руководстве.

In-depth counterintelligence tactics to fight cyber-espionage.
"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot
Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.

Название: Reverse Deception: Organized Cyber Threat Counter-Exploitation
Автор: Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones
Издательство: McGraw-Hill Education
Год: 2012
ISBN: 978-0071772495
Язык: Английский
Формат: PDF
Размер: 14.15 MB
Страниц: 464

Содержание:










Похожие публикации

Fundamentals of Information Systems Security Fundamentals of Information Systems Security
Part of the New Jones & Bartlett Learning Information Systems Security & Assurance Series! Fundamentals of Information System Security provides a comprehensive overview of the essential concepts readers must know as they pursue careers in

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the per Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the per
Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on

The Hacker's Guide to OS X: Exploiting OS X from the Root Up The Hacker's Guide to OS X: Exploiting OS X from the Root Up
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the

Hacking Exposed Mobile: Security Secrets & Solutions Hacking Exposed Mobile: Security Secrets & Solutions
Proven security tactics for today's mobile apps, devices, and networks. "A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." Slashdot. Hacking Exposed

Secrets of Proshow Experts Secrets of Proshow Experts
"Secrets of ProShow Experts: The Photodex Official Guide to Creating Your Best Slideshows" teaches creative techniques for creating more professional-looking and polished slide shows with ProShow software.

Penetration Testing: A Hands-On Introduction to Hacking Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

Android Hacker's Handbook Android Hacker's Handbook
The first comprehensive guide to discovering and preventing attacks on the Android OS. As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank

Computer and Information Security Handbook Computer and Information Security Handbook
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
Cyber security, encompassing both information and network security, is of utmost importance in today's information age.

The Counter-Insurgency Manual The Counter-Insurgency Manual
Автор: Leroy Thompson Название: The Counter-Insurgency Manual Издательство: Greenhill Books Год: 2006 Страниц: 176 ISBN: 1853675024 Формат: pdf Размер: 78,9 Мб Язык: Английский Качество: хорошее World-renowned expert in the fields of




Отзывы и Комментарии





Добавление комментария

Ваше Имя:
Ваш E-Mail:(необязательно)
  • bowtiesmilelaughingblushsmileyrelaxedsmirk
    heart_eyeskissing_heartkissing_closed_eyesflushedrelievedsatisfiedgrin
    winkstuck_out_tongue_winking_eyestuck_out_tongue_closed_eyesgrinningkissingstuck_out_tonguesleeping
    worriedfrowninganguishedopen_mouthgrimacingconfusedhushed
    expressionlessunamusedsweat_smilesweatdisappointed_relievedwearypensive
    disappointedconfoundedfearfulcold_sweatperseverecrysob
    joyastonishedscreamtired_faceangryragetriumph
    sleepyyummasksunglassesdizzy_faceimpsmiling_imp
    neutral_faceno_mouthinnocent

Книги




Союз образовательных сайтов