"A complete guide to understanding and fighting advanced persistent threats—today's most destructive risk to enterprise security Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize them according to risk level, and prioritize your actions accordingly by applying expert, field-tested private- and government-sector methods (NSA, FBI, and DOD). APTs cannot b ..."
Reverse Deception Organized Cyber Threat Counter-Exploitation by SeanBodmer, Max Kilger, Gregory Carpenter & JadeJones by SeanBodmer Paperback, Published 2012 by Tata Mcgraw-Hill Education Pvt. Ltd ISBN-13: 978-1-259-06101-1, ISBN: 1-259-06101-9
"Learn the concepts, methods, and implications of offensive cyber counterintelligence Hacking Back: Offensive Cyber Counterintelligence is a look at cyber counterintelligence theory in a WikiLeaks world. The authors detail techniques—from phishing to sniffing and from attribution to takedown—all bolstered by case examples and rooted in the authors’ many years of in-the-trenches experience in trap-setting and detecting breaches. The book’ ..."
"In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s ..."