Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Aggressive Network Self-Defense

Buy
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • See chillingly realistic examples of everything from a PDA to the MD5 hash being used as weapons in cyber dog fights.
There is a certain satisfaction for me in seeing this book published. When I presented my "strike-back" concept to the security community years ago, I was surprised by the ensuing criticism from my peers. I thought they would support our right to defend ourselves, and that the real challenge would be educating the general public. It was the other way around, however. This is why I'm happy to see Aggressive Network Self-Defense published. It shows that people are beginning to consider the reality of today's internet. Many issues are not black and white, right or wrong, legal or illegal. Some of the strike-back approaches in this book I support. Others, I outright disagree with. But that's good--it gives us the chance to truly think about each situation--and thinking is the most important part of the security business. Now is the time to analyze the technologies and consider the stories presented in this book before fiction becomes reality.--Timothy M. Mullen, CIO and Chief Software Architect for AnchorIS.Com
  • When the Worm Turns... Analyze the technical and legal implications of "neutralizing" machines that propagate malicious worms across the Internet.
  • Are You the Hunter or the Hunted? Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences.
  • Reverse Engineer Working Trojans, Viruses, and Keyloggers Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker.
  • To Catch a Thief... Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced.
  • Learn the Definition of "Hostile Corporate Takeover" in Cyberspace Find out who will own the fictional Primulus Corporation as attacker and defender wage war.
  • Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation.
  • See What Can Happen when the Virtual World Meets the Real World Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes.
  • Where the Wild Things Are... Follow along as a real-life "in-the-wild" format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine.
  • Implement Passive Strike-Back Technologies Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.
(HTML tags aren't allowed.)

Adobe Photoshop Restoration & Retouching (3rd Edition) (Voices That Matter)
Adobe Photoshop Restoration & Retouching (3rd Edition) (Voices That Matter)
Whether you’re a professional photographer or the family shutterbug, you can’t afford to miss the third edition of the now classic Photoshop Restoration & Retouching. Katrin Eismann and co-author Wayne Palmer have reviewed, updated, and revised every single technique to address the most important features in Adobe Photoshop CS2....
IPv6, Second Edition: Theory, Protocol, and Practice, 2nd Edition (The Morgan Kaufmann Series in Networking)
IPv6, Second Edition: Theory, Protocol, and Practice, 2nd Edition (The Morgan Kaufmann Series in Networking)
The newly revised edition of this best-seller is a complete guide to the deployment of the newest version of the Internet protocol, IPv6.

The second edition of IPv6: Theory, Protocol, and Practice guides readers through implemetation and deployment of IPv6. The Theory section takes a close, unbiased look at why so
...
Hands-On Start to Wolfram Mathematica
Hands-On Start to Wolfram Mathematica

For more than 25 years, Mathematica has been the principal computation environment for millions of innovators, educators, students, and others around the world. This book is an introduction to Mathematica. The goal is to provide a hands-on experience introducing the breadth of Mathematica, with a focus on ease of use. Readers get detailed...


Mastering Autodesk Inventor and Autodesk Inventor LT 2011
Mastering Autodesk Inventor and Autodesk Inventor LT 2011

Autodesk Inventor was introduced in 1999 as an ambitious 3D parametric modeler based not on the familiar AutoCAD programming architecture but instead on a separate foundation that would provide the room needed to grow into the fully featured modeler it is now, a decade later. Inventor 2011 continues the development of Inventor with...

Webster's New World Hacker Dictionary
Webster's New World Hacker Dictionary
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace.

Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.

Cyberspace has a language all its own. Understanding it is vital
...
Software Industry Accounting (with CD-ROM)
Software Industry Accounting (with CD-ROM)
The software industry is being inundated with important accounting and valuation questions. The rules and regulations governing accounting of the software industry are very different from other industries. The software industry has unique accounting concerns, such as capitalization of development costs and software revenue recognition. This book...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy