Book description
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker.*First book to demonstrate and explore controversial network strike back and countermeasure techniques.
*Provides tightly guarded secrets to find out WHO is really attacking you over the internet.
*Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.
Table of contents
- Cover (1/4)
- Cover (2/4)
- Cover (3/4)
- Cover (4/4)
- Contents (1/3)
- Contents (2/3)
- Contents (3/3)
- Foreword
- Fictionalized Cases of Network Strike-Back, Self-Defense, and Revenge
- PDA Perils: Revenge from the Palm of Your Hand (1/12)
- PDA Perils: Revenge from the Palm of Your Hand (2/12)
- PDA Perils: Revenge from the Palm of Your Hand (3/12)
- PDA Perils: Revenge from the Palm of Your Hand (4/12)
- PDA Perils: Revenge from the Palm of Your Hand (5/12)
- PDA Perils: Revenge from the Palm of Your Hand (6/12)
- PDA Perils: Revenge from the Palm of Your Hand (7/12)
- PDA Perils: Revenge from the Palm of Your Hand (8/12)
- PDA Perils: Revenge from the Palm of Your Hand (9/12)
- PDA Perils: Revenge from the Palm of Your Hand (10/12)
- PDA Perils: Revenge from the Palm of Your Hand (11/12)
- PDA Perils: Revenge from the Palm of Your Hand (12/12)
- The Case of a WLAN Attacker: In the Booth (1/6)
- The Case of a WLAN Attacker: In the Booth (2/6)
- The Case of a WLAN Attacker: In the Booth (3/6)
- The Case of a WLAN Attacker: In the Booth (4/6)
- The Case of a WLAN Attacker: In the Booth (5/6)
- The Case of a WLAN Attacker: In the Booth (6/6)
- MD5: Exploiting the Generous (1/4)
- MD5: Exploiting the Generous (2/4)
- MD5: Exploiting the Generous (3/4)
- MD5: Exploiting the Generous (4/4)
- A VPN Victim’s Story: Jack’s Smirking Revenge (1/9)
- A VPN Victim’s Story: Jack’s Smirking Revenge (2/9)
- A VPN Victim’s Story: Jack’s Smirking Revenge (3/9)
- A VPN Victim’s Story: Jack’s Smirking Revenge (4/9)
- A VPN Victim’s Story: Jack’s Smirking Revenge (5/9)
- A VPN Victim’s Story: Jack’s Smirking Revenge (6/9)
- A VPN Victim’s Story: Jack’s Smirking Revenge (7/9)
- A VPN Victim’s Story: Jack’s Smirking Revenge (8/9)
- A VPN Victim’s Story: Jack’s Smirking Revenge (9/9)
- Network Protection: Cyber-Attacks Meet Physical Response (1/7)
- Network Protection: Cyber-Attacks Meet Physical Response (2/7)
- Network Protection: Cyber-Attacks Meet Physical Response (3/7)
- Network Protection: Cyber-Attacks Meet Physical Response (4/7)
- Network Protection: Cyber-Attacks Meet Physical Response (5/7)
- Network Protection: Cyber-Attacks Meet Physical Response (6/7)
- Network Protection: Cyber-Attacks Meet Physical Response (7/7)
- Network Insecurity: Taking Patch Management to the Masses (1/7)
- Network Insecurity: Taking Patch Management to the Masses (2/7)
- Network Insecurity: Taking Patch Management to the Masses (3/7)
- Network Insecurity: Taking Patch Management to the Masses (4/7)
- Network Insecurity: Taking Patch Management to the Masses (5/7)
- Network Insecurity: Taking Patch Management to the Masses (6/7)
- Network Insecurity: Taking Patch Management to the Masses (7/7)
- The Fight for the Primulus Network: Yaseen vs Nathan (1/8)
- The Fight for the Primulus Network: Yaseen vs Nathan (2/8)
- The Fight for the Primulus Network: Yaseen vs Nathan (3/8)
- The Fight for the Primulus Network: Yaseen vs Nathan (4/8)
- The Fight for the Primulus Network: Yaseen vs Nathan (5/8)
- The Fight for the Primulus Network: Yaseen vs Nathan (6/8)
- The Fight for the Primulus Network: Yaseen vs Nathan (7/8)
- The Fight for the Primulus Network: Yaseen vs Nathan (8/8)
- Undermining the Network: A Breach of Trust (1/7)
- Undermining the Network: A Breach of Trust (2/7)
- Undermining the Network: A Breach of Trust (3/7)
- Undermining the Network: A Breach of Trust (4/7)
- Undermining the Network: A Breach of Trust (5/7)
- Undermining the Network: A Breach of Trust (6/7)
- Undermining the Network: A Breach of Trust (7/7)
- ADAM: Active Defense Algorithm and Model (1/6)
- ADAM: Active Defense Algorithm and Model (2/6)
- ADAM: Active Defense Algorithm and Model (3/6)
- ADAM: Active Defense Algorithm and Model (4/6)
- ADAM: Active Defense Algorithm and Model (5/6)
- ADAM: Active Defense Algorithm and Model (6/6)
- Defending Your Right to Defend (1/2)
- Defending Your Right to Defend (2/2)
- MD5 to Be Considered Harmful Someday (1/4)
- MD5 to Be Considered Harmful Someday (2/4)
- MD5 to Be Considered Harmful Someday (3/4)
- MD5 to Be Considered Harmful Someday (4/4)
- When the Tables Turn: Passive Strike-Back (1/7)
- When the Tables Turn: Passive Strike-Back (2/7)
- When the Tables Turn: Passive Strike-Back (3/7)
- When the Tables Turn: Passive Strike-Back (4/7)
- When the Tables Turn: Passive Strike-Back (5/7)
- When the Tables Turn: Passive Strike-Back (6/7)
- When the Tables Turn: Passive Strike-Back (7/7)
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Related Titles
Product information
- Title: Aggressive Network Self-Defense
- Author(s):
- Release date: April 2005
- Publisher(s): Syngress
- ISBN: 9780080488295
You might also like
book
Bio-Inspired Computing and Networking
From ant-inspired allocation to a swarm algorithm derived from honeybees, this book explains how the study …
article
Use GitHub Copilot: Additional Tips
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …
article
Run Llama-2 Models Locally with llama.cpp
Llama is Meta’s answer to the growing demand for LLMs. Unlike its well-known technological relative, ChatGPT, …
article
Use Github Copilot for Prompt Engineering
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …