EUR 16,09
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 3 images

Offensive Countermeasures: The Art of Active Defense (Anglais) Broché – 22 juillet 2013

4,3 étoiles sur 5
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile
4,3 étoiles sur 5 35 commentaires client

Voir les 3 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 16,09
EUR 15,81 EUR 54,99
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations
click to open popover

Offres spéciales et liens associés

Descriptions du produit

Présentation de l'éditeur

Tired of playing catchup with hackers? Does it ever seem they have all of the cool tools? Does it seem like defending a network is just not fun? This books introduces new cyber-security defensive tactics to annoy attackers, gain attribution and insight on who and where they are. It discusses how to attack attackers in a way which is legal and incredibly useful.

Biographie de l'auteur

John Strand is a member of PaulDotCom Security Weekly, Owner of Black Hills Information Security and a instructor with the SANS Institute. Paul Asadoorian is the founder of PaulDotCom Security Weekly. --Ce texte fait référence à une édition épuisée ou non disponible de ce titre.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Détails sur le produit

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur (beta) 4.3 étoiles sur 5 35 commentaires
5.0 étoiles sur 5 Much Needed Resource 5 décembre 2015
Par J. G. Gomberg - Publié sur
Format: Format Kindle Achat vérifié
Those who overlook countermeasures as an integral component of security will surely fail in their roles as protectors. OCM is an excellent overview of the topic and a better than entry level introduction.

I remember coding countermeasures in the early days designed specifically to take compromised systems promiscuously engaged in the act of attacking other systems off-line and display a helpful boot screen for the target systems' administrators. We were never destructive or vindictive and always treated such responses unapologetically as self-defense; because that is exactly what it was.

Law enforcement does not protect, moves at glacial speeds, and will generally defer from action unless a successful prosecution is assured (or the pubic noise level demands it). (Don't misunderstand me, I have the highest respect for first responders.) It is therefore incumbent for those of us with the skills to responsibly protect our infrastructure using measured responses consistent with threat level.

OCM does exactly what it intends by succinctly covering the important elements of this neglected topic and furthers a much needed discussion. Highly recommended.
4.0 étoiles sur 5 Good Introduction to the topic. Needs an editor. 17 juillet 2016
Par David - Publié sur
Format: Broché Achat vérifié
However, the book could use an editor. As many other reviewers have noted, the specific methods to implement the active defenses are missing or only briefly described; but this book is an introduction, not an implementation manual. When they publish a second edition, I would recommend: (1) a table of contents, (2) an index, (3) spelling out acronyms or including an acronym table, (4) using some sort of style guide for references (e.g., IEEE, APA), (5) providing legible graphics (i.e., several screenshots are grainy and hard to read, (6) provide references to figures and graphics; its not always clear where in the text the explanation of the graphics exist, (7) add page numbers, (8) use consistent fonts and line spacing. These many minor issues combine to make this otherwise very readable book a challenge to get through. I’d give the book 5 stars on content and 3 on execution.
4 internautes sur 4 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Decent read though very brief 9 octobre 2013
Par Anon - Publié sur
Format: Format Kindle Achat vérifié
The book expands upon the tools and concepts utilized in the active defense suite. I purchased the book, because I appreciate the work they have put into that suite. That being said, I feel the book leaves a lot to be desired. The whole book seems rushed. Typos and errors abound. I was also expecting a little more depth into legality. For those new to the idea of actively defending networks or security in general, this is still a good read. For those with a little more experience, just view the Derbycon talk and download AD.
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Great Intro! 24 août 2013
Par Ed willson - Publié sur
Format: Broché Achat vérifié
As the book states: get your house in order first, and then go out and play.

I read this book today, and poked most of the modules in the ADHD CD.

This book tries to break the mold that hacking back is never okay.
What I found most interesting is the emphasis on NOT hacking the hackers. At least not now.

The emphasis is on obfuscation and data collection before (or if) taking any active action.

This book is not heavy on technical details - nor should it be.
It's trying to convey a new concept.

If you want to hack someone - there are plenty of technical resources on how to hack something. This book offers some ideas on an interesting and new line of thought.
7 internautes sur 7 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Nice reference but ... 18 août 2013
Par Jose L Quinones - Publié sur
Format: Format Kindle Achat vérifié
Nice to read but I think it fell short on the technical side. It would have been a lot better if it included more how materials or technical references so we could use it to bulid proof of concept projects.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique

Où en sont vos commandes ?

Livraison et retours

Besoin d'aide ?