Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Aggressive Network Self-Defense

Buy
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • See chillingly realistic examples of everything from a PDA to the MD5 hash being used as weapons in cyber dog fights.
There is a certain satisfaction for me in seeing this book published. When I presented my "strike-back" concept to the security community years ago, I was surprised by the ensuing criticism from my peers. I thought they would support our right to defend ourselves, and that the real challenge would be educating the general public. It was the other way around, however. This is why I'm happy to see Aggressive Network Self-Defense published. It shows that people are beginning to consider the reality of today's internet. Many issues are not black and white, right or wrong, legal or illegal. Some of the strike-back approaches in this book I support. Others, I outright disagree with. But that's good--it gives us the chance to truly think about each situation--and thinking is the most important part of the security business. Now is the time to analyze the technologies and consider the stories presented in this book before fiction becomes reality.--Timothy M. Mullen, CIO and Chief Software Architect for AnchorIS.Com
  • When the Worm Turns... Analyze the technical and legal implications of "neutralizing" machines that propagate malicious worms across the Internet.
  • Are You the Hunter or the Hunted? Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences.
  • Reverse Engineer Working Trojans, Viruses, and Keyloggers Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker.
  • To Catch a Thief... Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced.
  • Learn the Definition of "Hostile Corporate Takeover" in Cyberspace Find out who will own the fictional Primulus Corporation as attacker and defender wage war.
  • Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation.
  • See What Can Happen when the Virtual World Meets the Real World Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes.
  • Where the Wild Things Are... Follow along as a real-life "in-the-wild" format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine.
  • Implement Passive Strike-Back Technologies Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.
(HTML tags aren't allowed.)

JavaScript Testing Beginner's Guide
JavaScript Testing Beginner's Guide

JavaScript is an important part of web development in today's Web 2.0 world. While there are many JavaScript frameworks in the market, learning to write, test, and debug JavaScript without the help of any framework will make you a better JavaScript developer. However, testing and debugging can be time consuming, tedious, and painful. This...

Microsoft Money 2006 For Dummies (Computer/Tech)
Microsoft Money 2006 For Dummies (Computer/Tech)
Covers Premium, Deluxe, and Standard editions of Money

Use Money to save money, make money, manage money, and get your money's worth

Ever hear that it takes money to make money? Spend a little on this book and discover easy ways to set up accounts, do your banking online, research and track investments, make payments on time, even...

Hydrology and the Management of Watersheds
Hydrology and the Management of Watersheds

This new edition is a major revision of the popular introductory reference on hydrology and watershed management principles, methods, and applications. The book's content and scope have been improved and condensed, with updated chapters on the management of forest, woodland, rangeland, agricultural urban, and mixed land use watersheds....


Ocean Circulation in Three Dimensions
Ocean Circulation in Three Dimensions
Notable advances of the last quarter-century have deepened our appreciation of the three-dimensional nature of the ocean's large-scale circulation. This circulation has important implications for ocean chemistry and biology, atmospheric science, and climate. Ocean Circulation in Three Dimensions surveys both observations and theories of the...
Inside Delphi 2006 (Wordware Delphi Developer's Library)
Inside Delphi 2006 (Wordware Delphi Developer's Library)

Now in its 10th version, Delphi provides users with four programming languages: C++ and Delphi for Win32 for building Windows applications, and C# and Delphi for .NET for building applications that target the .NET platform. Inside Delphi 2006 demonstrates how to use all of these languages. Topics include the foundations of Delphi, VCL...

Java Rules
Java Rules
Detailed yet accessible, Java™ Rules is a comprehensive reference for the application programmer who needs to master the intricacies of the Java™ programming language. Thoroughly describing the core of the Java programming language and the Java™ virtual machine (JVM™), Java™ Rules makes it...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy