Offensive Countermeasures: The Art of Active Defense et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
EUR 16,09
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Offensive Countermeasures: The Art of Active Defense (Anglais) Broché – 1 juillet 2013


Voir les 3 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 16,09
EUR 14,42 EUR 12,07

Offres spéciales et liens associés



Descriptions du produit

Présentation de l'éditeur

Tired of playing catchup with hackers? Does it ever seem they have all of the cool tools? Does it seem like defending a network is just not fun? This books introduces new cyber-security defensive tactics to annoy attackers, gain attribution and insight on who and where they are. It discusses how to attack attackers in a way which is legal and incredibly useful.

Biographie de l'auteur

John Strand is a member of PaulDotCom Security Weekly, Owner of Black Hills Information Security and a instructor with the SANS Institute. Paul Asadoorian is the founder of PaulDotCom Security Weekly. --Ce texte fait référence à une édition épuisée ou non disponible de ce titre.


Détails sur le produit


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Extrait | Quatrième de couverture
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 30 commentaires
4 internautes sur 4 ont trouvé ce commentaire utile 
Nice reference but ... 18 août 2013
Par Jose L Quinones - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Nice to read but I think it fell short on the technical side. It would have been a lot better if it included more how materials or technical references so we could use it to bulid proof of concept projects.
3 internautes sur 3 ont trouvé ce commentaire utile 
Decent read though very brief 9 octobre 2013
Par Anon - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
The book expands upon the tools and concepts utilized in the active defense suite. I purchased the book, because I appreciate the work they have put into that suite. That being said, I feel the book leaves a lot to be desired. The whole book seems rushed. Typos and errors abound. I was also expecting a little more depth into legality. For those new to the idea of actively defending networks or security in general, this is still a good read. For those with a little more experience, just view the Derbycon talk and download AD.
2 internautes sur 2 ont trouvé ce commentaire utile 
Pretty good overview of Offensive strategies 29 septembre 2013
Par Brian Anderson - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Overall this book provides a good review of high level concepts with some minor depth of what organizations can do to better protect their assets using both defensive and offensive strategies. I was just hoping for a more technical explanation, and more advanced techniques, but the book does cover what it states. I really hope that there will be a continuation of discussions and more information released regarding this topic and the future of where cyber security / warfare will bring us
Very good book for people with the right level of knowledge 14 avril 2014
Par Colin Edwards - Publié sur Amazon.com
Format: Broché
This is a great read for someone that has already spent some time doing Information Security on either the offensive or defensive side. It presents some creative ways to perform annoyance, attribution, and, ultimately, attack the attackers. Since this is quite different from the traditional and accepted approaches to InfoSec, I look forward to seeing how the industry responds to the ideas that are presented.

The book is self-published...there are some typos, minor grammatical problems, etc. But the content is very good.

This book should be one of many resources that you use to grow your knowledge and abilities.
Great Content 9 avril 2014
Par desktopyou - Publié sur Amazon.com
Format: Broché
This is a great book to have at the ready for when you need it. John & Paul really know their stuff. Terrific resource, highly recommended.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?