Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Aggressive Network Self-Defense

Buy
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • See chillingly realistic examples of everything from a PDA to the MD5 hash being used as weapons in cyber dog fights.
There is a certain satisfaction for me in seeing this book published. When I presented my "strike-back" concept to the security community years ago, I was surprised by the ensuing criticism from my peers. I thought they would support our right to defend ourselves, and that the real challenge would be educating the general public. It was the other way around, however. This is why I'm happy to see Aggressive Network Self-Defense published. It shows that people are beginning to consider the reality of today's internet. Many issues are not black and white, right or wrong, legal or illegal. Some of the strike-back approaches in this book I support. Others, I outright disagree with. But that's good--it gives us the chance to truly think about each situation--and thinking is the most important part of the security business. Now is the time to analyze the technologies and consider the stories presented in this book before fiction becomes reality.--Timothy M. Mullen, CIO and Chief Software Architect for AnchorIS.Com
  • When the Worm Turns... Analyze the technical and legal implications of "neutralizing" machines that propagate malicious worms across the Internet.
  • Are You the Hunter or the Hunted? Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences.
  • Reverse Engineer Working Trojans, Viruses, and Keyloggers Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker.
  • To Catch a Thief... Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced.
  • Learn the Definition of "Hostile Corporate Takeover" in Cyberspace Find out who will own the fictional Primulus Corporation as attacker and defender wage war.
  • Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation.
  • See What Can Happen when the Virtual World Meets the Real World Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes.
  • Where the Wild Things Are... Follow along as a real-life "in-the-wild" format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine.
  • Implement Passive Strike-Back Technologies Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.
(HTML tags aren't allowed.)

Cisco Unified Presence Fundamentals (Networking Technology: IP Communications)
Cisco Unified Presence Fundamentals (Networking Technology: IP Communications)

Unified Communications and Collaboration is on the so-called “Hot List” in any forum wherein people are discussing communications and ways to better stay in touch. This book is aimed at explaining the concepts, ideas, and capabilities behind Presence, which is likely one of the least understood and most underestimated features in...

Understanding Diabetes: A Biochemical Perspective
Understanding Diabetes: A Biochemical Perspective

A clear explanation of the cause, diagnosis, and treatment of diabetes

Written for a broad range of readers, including students, researchers, policymakers, health care providers, and diabetes patients and caregivers, this book explains the underlying biochemistry and physiology of diabetes mellitus. Each chapter contains a...

Arduino and LEGO Projects
Arduino and LEGO Projects

We all know how awesome LEGO is, and more and more people are discovering how many amazing things you can do with Arduino. In Arduino and LEGO Projects, Jon Lazar shows you how to combine two of the coolest things on the planet to make fun gadgets like a Magic Lantern RF reader, a sensor-enabled LEGO music box, and even an...


Liver and Biliary Tract Surgery: Embryological Anatomy to 3D-Imaging and Transplant Innovations
Liver and Biliary Tract Surgery: Embryological Anatomy to 3D-Imaging and Transplant Innovations

This beautifully illustrated monograph provides an up-to-date and comprehensive overview about all fields of liver and biliary tract surgery and liver transplantation. It consists of four sections with 48 chapters: Section I: Anatomy, physiology, imaging and general principles, Section II: Biliary tract surgery, Section III: Liver surgery and...

Green Your Home All in One For Dummies
Green Your Home All in One For Dummies
In the grand accounting of the planet, every step you take toward a greener lifestyle makes a difference. Toss your banana peel in a compost pile instead of into a plastic trash bag, and you get to pat yourself on the back. Of course you’re not going to save the planet by taking your own reusable tote bag to the grocery store, but...
Astrology For Dummies (Sports & Hobbies)
Astrology For Dummies (Sports & Hobbies)
Learn how to get your precise horoscope, decipher astrological symbols, and benefit from the phases of the moon with Astrology for Dummies, Second Edition. You’ll learn how to construct your birth chart, interpret its component parts, and use that information to gain insight into yourself and others. With easy-to-follow, hands-on...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy