null
Loading... Please wait...
FREE SHIPPING on All Unbranded Items LEARN MORE
Print This Page

Reverse Deception: Organized Cyber Threat Counter-Exploitation

List Price: $55.00
SKU:
9780071772495
Quantity:
Minimum Purchase
25 unit(s)
  • Availability: Confirm prior to ordering
  • Branding: minimum 50 pieces (add’l costs below)
  • Check Freight Rates (branded products only)

Branding Options (v), Availability & Lead Times

  • 1-Color Imprint: $2.00 ea.
  • Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
  • Belly-Band Wrap: $2.50 ea. (full-color printed)
  • Set-Up Charge: $45 per decoration
FULL DETAILS
  • Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
  • Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
  • Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
  • RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
  • Product Details

    Author:
    Sean M. Bodmer, Gregory Carpenter, Max Kilger, Jade Jones
    Format:
    Paperback
    Publisher:
    McGraw Hill LLC (July 24, 2012)
    Audience:
    General/trade
    ISBN-13:
    9780071772495
    ISBN-10:
    0071772499
    Weight:
    27.04oz
    Dimensions:
    7.5" x 9.2" x 0.9"
    Case Pack:
    16
    File:
    McGrawHill-MH_ONIX_V30_US_onix30_all(26_05_19)-20260519.xml
    Folder:
    McGrawHill
    As low as:
    $42.35
    List Price:
    $55.00
    Publisher Identifier:
    P-MCGRAW
    Discount Code:
    A
    Pages:
    464
    Pub Discount:
    55
    Imprint:
    McGraw Hill
  • Overview

    In-depth counterintelligence tactics to fight cyber-espionage

    "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot

    Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.

    • Establish the goals and scope of your reverse deception campaign
    • Identify, analyze, and block APTs
    • Engage and catch nefarious individuals and their organizations
    • Assemble cyber-profiles, incident analyses, and intelligence reports
    • Uncover, eliminate, and autopsy crimeware, trojans, and botnets
    • Work with intrusion detection, anti-virus, and digital forensics tools
    • Employ stealth honeynet, honeypot, and sandbox technologies
    • Communicate and collaborate with legal teams and law enforcement