Reverse Deception Organized Cyber Threat Counter-Exploitation

Reverse Deception Organized Cyber Threat Counter-ExploitationA complete guide to understanding and fighting advanced persistent threats—today's most destructive risk to enterprise security

Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize them according to risk level, and prioritize your actions accordingly by applying expert, field-tested private- and government-sector methods (NSA, FBI, and DOD).

APTs cannot be seen, spread invisibly, and then continue to live in an enterprise network, undetected. In this one-of-a-kind book, the authors explain how to get—and stay—ahead of today's well-organized and extremely persistent brand of network enemies. The book describes the characteristics of malware and botnets, how they can morph, evade detection, and spin off decoys that live in-network, while appearing to have been cleaned up and debugged. This detailed guide then reveals how to detect the appearance of malicious code, decode the types of enemies they originate from, and finally, how to extricate malcode and deflect its future entry into networks.

Reverse Deception: Organized Cyber Threat Counter-Exploitation features:

  • Full coverage of the #1 feared type of network attack today, the APT
  • Descriptions of cyber espionage tactics seen in the U.S. and internationally, with comparisons of the types of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa
  • Enthralling case studies and true stories from the authors' FBI, DOD, NSA, and private sector work
  • Foreword by Fred Feer, a security professional with 40 years’ experience with the U.S. Army counterintelligence, CIA, RAND, and independent consulting
  • Complete coverage of key aspects of deception, counter-deception, behavioral profiling, and security within the cyber realm
  • Cat-and-mouse strategies from the best in the game—explains how to implement deception and disinformation techniques against a variety of incoming threats aimed at enticing adversaries out into the open
  • A fresh perspective on innovative, field-tested ideas for successfully countering current digital threats—plus expected characteristics of the next threats to come
  • Legal explanations of capabilities, limitations, and requirements for assisting law enforcement investigations

Coverage includes:
Deception Throughout History to Today; The Applications & Goals of Cyber Counterintelligence; The Missions and Outcomes of Criminal Profiling; Legal & Ethical Aspects of Deception; Attack Tradecraft; Operational Deception; Tools, Tactics & Procedures; Attack Attribution; Black Hat Motivators; Understanding Advanced Persistent Threats; When & When Not to Act; Implementation & Validation Tactics

Price: $40.00

Click here to buy from Amazon

 

Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow’s Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality)

Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality)The electricity infrastructure is one of society’s most critical infrastructures. The complexity of the electricity infrastructure system is increasing quickly, due to the increasing intensity of market-based power exchanges between electricity systems, the associated market restructuring and an increasing share of decentralized generation. As a consequence, the organizational complexity of power systems has exploded. At the same time, there is a shift in public and societal goals towards low-carbon and sustainable power generation. This will eventually require a drastic transformation of the industry. Increasingly, ICT is being depended upon for managing this infrastructure, for technical control and operation and for facilitating markets. A recent example is demand-side management, based on detailed metering of consumption and decentralized electricity generation.

The mutual dependence of the electricity and the ICT infrastructures raises challenging questions in the areas of dependability, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether accidental or intentional such as in cyber attacks, are called for.

To address the above mentioned problems an advanced research workshop: “Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT” was organized in the Netherlands in May 2009. The objective of the workshop was to contribute to the security of current and future electricity infrastructures by analyzing the risks that are caused by the increasing reliance upon ICT and investigating options for managing these risks. The book presents the contributions to the workshop by distinguished invited keynote speakers and participants from the international scientific and industrial community.

Price: $129.00

Click here to buy from Amazon

Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security

Bombs and Bandwidth: The Emerging Relationship Between Information Technology and SecurityA multidisciplinary view of Information Technology as it is used by governments and criminal organizations alike.

Why buy a multi-billion-dollar satellite and go to extreme lengths to try to avoid governmental detection when you can just buy a bit of airtime and send one of several million messages going out at any given time?—from Bombs and Bandwidth

Information Technology (IT) has become central to the way governments, businesses, social movements and even terrorist and criminal organizations pursue their increasingly globalized objectives. With the emergence of the Internet and new digital technologies, traditional boundaries are increasingly irrelevant, and traditional concepts—from privacy to surveillance, vulnerability, and above all, security—need to be reconsidered. In the post-9/11 era of “homeland security,” the relationship between IT and security has acquired a new and pressing relevance. Bombs and Bandwidth, a project of the Social Science Research Council, assembles leading scholars in a range of disciplines to explore the new nature of IT-related threats, the new power structures emerging around IT, and the ethical and political implications arising from this complex and important field.

Contributors include: Ralf Bendrath, Michael Dartnell, Robert J. Deibert, Dorothy Denning, Chris Hables Gray, Rose Kadende-Kaiser, Susan Landau, Robert Latham, Timothy Lenoir, Martin Libicki, Carolyn Nordstrom, Rafal Rohozinski, Marc Rotenberg, Janice Gross Stein, Rachel Yould.

Price: $17.95

Click here to buy from Amazon

Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts

Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security ExpertsDr. Ali Jahangiri, a world-renowned information technology (IT) expert, brings us the next must-have in IT training: Live Hacking, the definitive and comprehensive guide to computer hacking. Groundbreaking, insightful, and practical, this guide serves to inform IT professionals about and challenge existing conceptions of hacking, its victims, and its consequences, but with an eye to empowering prospective victims with the knowledge they need to thwart the criminal elements in cyberspace. Whether you work in a Fortune 500 company or if you're just looking to protect your home office from hackers, this book will provide you with all the information you need to protect your valuable information. Live Hacking is straightforward, easy to read, and a reference that you'll use again and again. It's the kind of book you'll want to keep in your back pocket! With a user-friendly writing style and easy-to-follow diagrams and computer screenshots.

Price: $49.95

Click here to buy from Amazon

Information Warfare: How to Survive Cyber Attacks

Information Warfare: How to Survive Cyber AttacksAnother release in our popular “Computer World: Books for IT Leaders” series, Information Warfare explains the methodologies behind hacks and cyber attacks and provides defensive strategies and counter measures designed to help companies survive infrastructure attacks, military conflicts, competitive intelligence gathering, economic warfare, and corporate espionage. The authors are renowned industry experts–Michael Erbschloe has connections with the government and is known for his analysis of The Love Bug.





Price: $29.99

Click here to buy from Amazon