008 |
|
070806s2005 maua ob 001 0 eng d |
020 |
|
|a9781931836203
|
020 |
|
|a1931836205
|
035 |
|
|a(OCoLC)162721189
|
037 |
|
|a112087:112175|bElsevier Science & Technology|nhttp://www.sciencedirect.com
|
040 |
|
|aOPELS|cOPELS
|
049 |
|
|aTEFA
|
050 |
14
|
|aTK5105.59|b.A387 2005eb
|
050 |
14
|
|aQA76.9.A25|bA447 2005eb
|
082 |
04
|
|a005.8|222
|
245 |
00
|
|aAggressive network self-defense:|h[electronic resource] /|cNeil Archibald ... [et al.] ; technical editor Neil R. Wyler (aka Grifter), foreword by Timothy M. Mullen (Thor).
|
260 |
|
|aRockland, MA :|bSyngress Pub.,|cc2005.
|
300 |
|
|axxx, 383 p. :|bill. ;|c24 cm.
|
504 |
|
|aIncludes bibliographical references and index.
|
505 |
0
|
|aIntroduction: -- What's in a hat? -- Chapter 1: Is it Legal to Strike Back? -- Chapter 2: Automated Strike Back Worms -- Chapter 3: Targeting an Attacking Host -- Chapter 4: Aggressive Intrusion Prevention Systems Chapter 5: Honey Pots and Honey Nets -- Chapter 6: Windows Insecurity: Shattering the Glass. Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know Your Enemy: Social Engineering Chapter 10: Google This! -- Chapter 11: When Enough is Enough.
|
520 |
|
|aOver the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker. *First book to demonstrate and explore controversial network strike back and countermeasure techniques. *Provides tightly guarded secrets to find out WHO is really attacking you over the internet. *Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.
|
533 |
|
|aElectronic reproduction.|bAmsterdam :|cElsevier Science & Technology,|d2007.|nMode of access: World Wide Web.|nSystem requirements: Web browser.|nTitle from title screen (viewed on Aug. 2, 2007).|nAccess may be restricted to users at subscribing institutions.
|
650 |
0
|
|aComputer security.
|
650 |
0
|
|aComputer networks|xSecurity measures.
|
650 |
0
|
|aInternet|xSecurity measures.
|
655 |
7
|
|aElectronic books.|2local
|
700 |
1
|
|aArchibald, Neil.
|
700 |
1
|
|aWyler, Neil R.
|
700 |
1
|
|aMullen, Timothy M.
|
710 |
2
|
|aScienceDirect (Online service)
|
776 |
1
|
|cOriginal|z1931836205|z9781931836203|w(OCoLC)58566416
|
856 |
40
|
|3ScienceDirect|uhttp://www.sciencedirect.com/science/book/9781931836203|zAn electronic book accessible through the World Wide Web; click for information
|
994 |
|
|aC0|bTEF
|