De som köpt den här boken har ofta också köpt The Art of Doing Science and Engineering av Richard Hamming (inbunden).
Köp båda 2 för 798 krSean M. Bodmer, CISSP, CEH, is a senior threat intelligence analyst at Damballa, Inc., a crimeware detection, security provider, and research firm consulting to Fortune 500 and 1,000 companies. He analyzes and tracks thousands of strings of network activity each week, scanning for malicious activity and focuses on attribution of each criminal and campaign. Sean is a frequent speaker on network security concepts and practices, including at DoD conferences, and has been invited to speak and train cyber counterintelligence courses around the world. He's the co-author of Hacking Exposed: Malware & Rootkits. Max Kilger, Ph.D., is specialist in profiling and behavioral analysis of the black hat community and hackers. He is a founding member of the Honeynet Project, is currently on their board of directors, and serves as their chief membership officer and chief profiler. Dr. Kilger is a frequent national and international speaker to the intelligence community, military, federal law enforcement, and information security forums. He received his doctorate from Stanford University in Social Psychology in 1993. Gregory Carpenter, CISM, Jade Jones, JD, Jeffrey R. Jones, CISSP, GCIH, and C|EH (Washington, D.C.) has more than 20 years of experience as a government intelligence and cyber threat analyst. He has held several positions within the Department of Defense, most recently focusing on the the US Army's vulnerabilities and capabilities in cyberspace. Jeff holds a B.S. in Computer Science (Texas A&M - Corpus Christi) and an M.S. in Computer Science with an emphasis in Information Security (James Madison University). He has published articles on cyber threats and espionage in the National Intelligence Journal and various trade publications.
Ch 1. Introduction
Ch 2. Deception Throughout History to Today
Ch 3. The Applications & Goals of Cyber Counterintelligence
Ch 4. The Missions and Outcomes of Criminal Profiling
Ch 5. Legal & Ethical Aspects of Deception
Ch 6. Attack Tradecraft
Ch 7. Operational Deception
Ch 8. Tools, Tactics & Procedures
Ch 9. Attack Attribution
Ch 10. Black Hat Motivators
Ch 11. Understanding Advanced Persistent Threats
Ch 12. When To & When Not To Act
Ch 13. Implementation & Validation Tactics
References
Appendices