Aggressive Network Self-defense
暫譯: 積極的網路自我防禦
Neil R. Wyler, Bruce Potter, Chris Hurley
- 出版商: Syngress Media
- 出版日期: 2005-04-01
- 售價: $2,000
- 貴賓價: 9.5 折 $1,900
- 語言: 英文
- 頁數: 448
- 裝訂: Paperback
- ISBN: 1931836205
- ISBN-13: 9781931836203
已過版
買這商品的人也買了...
-
$750$585 -
$580$458 -
$580$458 -
$1,840$1,748 -
$620$490 -
$680$199 -
$880$748 -
$550$523 -
$760$646 -
$750$585 -
$390$332 -
$580$458 -
$520$468 -
$890$757 -
$490$382 -
$620$490 -
$580$493 -
$450$351 -
$650$507 -
$680$537 -
$380$323 -
$650$514 -
$760$600 -
$420$332 -
$680$646
相關主題
商品描述
Description:
I'm Mad As Hell and I'm Not Gonna Take it Anymore!
Featuring: Neil R. Wyler (aka Grifter), Neil Archibald, Seth Fogie, Chris Hurley, Dan Kaminsky, Johnny Long, Nathan Marigoni (a.k.a. dedhed), Luke McOmie (aka Pyr0), Haroon Meer, Bruce Potter, Roelof Temmingh
These experts show you how to:
Analyze the Technical, Legal, and Financial Ramifications of Revolutionary and Controversial Network Strike-Back and Active Defense Techniques
Follow the Travails of Eight System Administrators Who Take Cyber Law into Their Own Hands
See Chillingly Realistic Examples of Everything from a PDA to the MD5 Hash Being Used as Weapons in Cyber Dogfights
There is a certain satisfaction for me in seeing this book published. When I presented my “strike-back” concept to the security community years ago, I was surprised by the ensuing criticism from my peers. I thought they would support our right to defend ourselves, and that the real challenge would be educating the general public. It was the other way around, however. This is why I’m happy to see Aggressive Network Self-Defense published. It shows that people are beginning to consider the reality of today’s Internet. Many issues are not black and white, right or wrong, legal or illegal. Some of the strike-back approaches in this book I support. Others, I outright disagree with. But that’s good—it gives us the chance to truly think about each situation—and thinking is the most important part of the security business. Now is the time to analyze the technologies and consider the stories presented in this book before fiction becomes reality.—Timothy M. Mullen, CIO and Chief Software Architect for AnchorIS.ComWhen the Worm Turns…
Analyze the technical and legal implications of “neutralizing” machines that propagate malicious worms across the Internet.
Are You the Hunter or the Hunted?
Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences.
Reverse Engineer Working Trojans, Viruses, and Keyloggers
Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker.
To Catch a Thief…
Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced.
Learn the Definition of “Hostile Corporate Takeover” in Cyberspace
Find out who will own the fictional Primulus Corporation as attacker and defender wage war.
Understand the Active Defense Algorithm Model (ADAM)
Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation.
See What Can Happen when the Virtual World Meets the Real World
Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes.
Where the Wild Things Are…
Follow along as a real-life “in-the-wild” format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine.
Implement Passive Strike-Back Technologies
Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.
商品描述(中文翻譯)
描述:
我非常憤怒,並且不會再忍受下去!
特邀嘉賓:Neil R. Wyler(又名 Grifter)、Neil Archibald、Seth Fogie、Chris Hurley、Dan Kaminsky、Johnny Long、Nathan Marigoni(又名 dedhed)、Luke McOmie(又名 Pyr0)、Haroon Meer、Bruce Potter、Roelof Temmingh
這些專家將向您展示如何:
分析革命性和具爭議性的網路反擊及主動防禦技術的技術、法律和財務影響
跟隨八位系統管理員的艱辛,他們將網路法律掌握在自己手中
看到從 PDA 到 MD5 雜湊被用作網路空戰武器的驚人現實範例
看到這本書出版對我來說有一種特別的滿足感。幾年前,我向安全社群提出我的「反擊」概念時,對同儕的批評感到驚訝。我以為他們會支持我們自我防衛的權利,而真正的挑戰將是教育大眾。然而,情況正好相反。這就是為什麼我很高興看到《積極的網路自我防衛》出版。這顯示人們開始考慮當今互聯網的現實。許多問題並不是黑白分明、對錯分明、合法或非法的。這本書中的一些反擊方法我支持,另一些我則完全不同意。但這很好——這讓我們有機會真正思考每一種情況,而思考是安全業務中最重要的部分。現在是分析技術並考慮本書中提出的故事的時候了,因為虛構變成現實的時刻即將來臨。——Timothy M. Mullen,AnchorIS.Com 的首席資訊官及首席軟體架構師
當蠕蟲轉變時…
分析「中和」在互聯網上傳播惡意蠕蟲的機器的技術和法律影響。
你是獵人還是獵物?
親自發現從防禦者轉變為攻擊者是多麼容易,並了解潛在的後果。
逆向工程工作中的木馬、病毒和鍵盤記錄器
對攻擊 Pocket PC 的惡意代碼進行取證分析,以追蹤、識別並反擊攻擊者。
抓住小偷…
追蹤被盜的軟體在點對點網路中的傳播,並學會繞過 MD5 校驗和驗證,以便追蹤多代攻擊者。
了解「網路空間中的敵意企業收購」的定義
找出在攻擊者和防禦者之間的戰爭中,誰將擁有虛構的 Primulus Corporation。
理解主動防禦演算法模型(ADAM)
分析在您的組織中實施主動防禦策略的主要考量:倫理、法律、意外後果和風險驗證。
看看當虛擬世界遇上現實世界時會發生什麼
使用鍵盤記錄器、藍牙設備利用和 Windows 取證來發現您的隔壁同事是否偷竊了不止是便利貼。
野生事物的所在…
隨著一個真實的「在野外」格式字串錯誤被轉變為反擊代碼,該代碼在攻擊者自己的機器上啟動一個監聽 shell。
實施被動反擊技術
學習策略並實施工具,以應對足跡偵察、網路偵查、漏洞掃描和利用代碼。