<p><b>In-depth counterintelligence tactics to fight cyber-espionage</b></p><p>A comprehensive and unparalleled overview of the topic by experts in the field.--<i>Slashdot</i></p><p>Expose pursue and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. <i>Reverse Deception: Organized Cyber Threat Counter-Exploitation</i> shows how to assess your network's vulnerabilities zero in on targets and effectively block intruders. Discover how to set up digital traps misdirect and divert attackers configure honeypots mitigate encrypted crimeware and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues operational vetting and security team management. <ul><li>Establish the goals and scope of your reverse deception campaign<li>Identify analyze and block APTs <li>Engage and catch nefarious individuals and their organizations <li>Assemble cyber-profiles incident analyses and intelligence reports <li>Uncover eliminate and autopsy crimeware trojans and botnets<li>Work with intrusion detection anti-virus and digital forensics tools<li>Employ stealth honeynet honeypot and sandbox technologies <li>Communicate and collaborate with legal teams and law enforcement </ul>
Piracy-free
Assured Quality
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.