Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Aggressive Network Self-Defense

Buy
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • See chillingly realistic examples of everything from a PDA to the MD5 hash being used as weapons in cyber dog fights.
There is a certain satisfaction for me in seeing this book published. When I presented my "strike-back" concept to the security community years ago, I was surprised by the ensuing criticism from my peers. I thought they would support our right to defend ourselves, and that the real challenge would be educating the general public. It was the other way around, however. This is why I'm happy to see Aggressive Network Self-Defense published. It shows that people are beginning to consider the reality of today's internet. Many issues are not black and white, right or wrong, legal or illegal. Some of the strike-back approaches in this book I support. Others, I outright disagree with. But that's good--it gives us the chance to truly think about each situation--and thinking is the most important part of the security business. Now is the time to analyze the technologies and consider the stories presented in this book before fiction becomes reality.--Timothy M. Mullen, CIO and Chief Software Architect for AnchorIS.Com
  • When the Worm Turns... Analyze the technical and legal implications of "neutralizing" machines that propagate malicious worms across the Internet.
  • Are You the Hunter or the Hunted? Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences.
  • Reverse Engineer Working Trojans, Viruses, and Keyloggers Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker.
  • To Catch a Thief... Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced.
  • Learn the Definition of "Hostile Corporate Takeover" in Cyberspace Find out who will own the fictional Primulus Corporation as attacker and defender wage war.
  • Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation.
  • See What Can Happen when the Virtual World Meets the Real World Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes.
  • Where the Wild Things Are... Follow along as a real-life "in-the-wild" format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine.
  • Implement Passive Strike-Back Technologies Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.
(HTML tags aren't allowed.)

The Best Damn Management Book Ever: 9 Keys to Creating Self-Motivated High Achievers
The Best Damn Management Book Ever: 9 Keys to Creating Self-Motivated High Achievers

Anyone who knows me knows I am a maniacal sports fan. I religiously follow Major League Baseball (San Francisco Giants), NFL football (New York Giants), and NBA basketball (Boston Celtics). My knowledge of useless sports trivia has won me numerous drinks in more bars than I care to remember. I see nothing wrong with Jimmy Fallon’s...

Professional SQL Server 2005 Programming (Programmer to Programmer)
Professional SQL Server 2005 Programming (Programmer to Programmer)
Professional SQL Server 2005 Programming shows experienced developers how to master the substantially revamped feature set of the latest release of Microsoft SQL Server. The book begins with a concise overview of the new features of SQL Server that is of interest to experienced developers. This is especially important given the substantial...
DNA Computing: 12th International Meeting on DNA Computing, DNA12, Seoul, Korea, June 5-9, 2006
DNA Computing: 12th International Meeting on DNA Computing, DNA12, Seoul, Korea, June 5-9, 2006
This book constitutes the thoroughly refereed postproceedings of the 11th International Workshop on DNA Based Computers, DNA11, held in London, ON, Canada, in June 2005.

The 34 revised full papers presented were carefully selected during two rounds of reviewing and improvement from an initial total of 79 submissions. The wide-ranging topics...


Schaum's Easy Outlines: College Chemistry
Schaum's Easy Outlines: College Chemistry
Most of the measurements and calculations in chemistry are concerned with quantities such as pressure, volume, mass, and energy. Every quantity includes both a number and a unit. The unit simultaneously identifies the kind of dimension and the magnitude of the reference quantity used...
Absolute Java with Student Resource Disk (2nd Edition) (Savitch Series)
Absolute Java with Student Resource Disk (2nd Edition) (Savitch Series)
With the second edition of Absolute Java, best-selling author Walt Savitch offers a comprehensive introduction of the java programming language.  This book gives programmers the tools to master the Java language.  He takes full advantage of the new Java 5.0 features and incorporates the new Scanner class. There is...
.NET Development for Java Programmers
.NET Development for Java Programmers

Java developers have adapted to a world in which everything is an object, resources are reclaimed by a garbage collector, and multiple inheritance is replaced by interfaces. All of these things have prepared developers to thrive in Microsoft's new .Net environment using C#.

Despite similarities between Java and C#, complex...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy