LEADER 03012nam 2200625Ia 450 001 9910455679703321 005 20200520144314.0 010 $a1-281-03580-7 010 $a9786611035808 010 $a0-08-048829-3 010 $a1-59749-029-6 035 $a(CKB)111056487032394 035 $a(EBL)225321 035 $a(OCoLC)475932201 035 $a(SSID)ssj0000276735 035 $a(PQKBManifestationID)11228645 035 $a(PQKBTitleCode)TC0000276735 035 $a(PQKBWorkID)10232980 035 $a(PQKB)11419417 035 $a(MiAaPQ)EBC225321 035 $a(CaSebORM)9781931836203 035 $a(Au-PeEL)EBL225321 035 $a(CaPaEBR)ebr10075669 035 $a(CaONFJC)MIL103580 035 $a(EXLCZ)99111056487032394 100 $a20040112d2005 uh 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAggressive network self-defense$b[electronic resource] /$fNeil R. Wyler 205 $a1st edition 210 $aRockland, MA $cSyngress Publishing$dc2005 215 $a1 online resource (417 p.) 300 $aDescription based upon print version of record. 311 $a1-931836-20-5 320 $aIncludes bibliographical references and index. 327 $aCover; Contents; Foreword; Fictionalized Cases of Network Strike-Back, Self-Defense, and Revenge; PDA Perils: Revenge from the Palm of Your Hand; The Case of a WLAN Attacker: In the Booth; MD5: Exploiting the Generous; A VPN Victim's Story: Jack's Smirking Revenge; Network Protection: Cyber-Attacks Meet Physical Response; Network Insecurity: Taking Patch Management to the Masses; The Fight for the Primulus Network: Yaseen vs Nathan; Undermining the Network: A Breach of Trust; ADAM: Active Defense Algorithm and Model; Defending Your Right to Defend; MD5 to Be Considered Harmful Someday 327 $aWhen the Tables Turn: Passive Strike-BackIndex; Related Titles 330 $aOver the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, crimin 606 $aComputer security 606 $aInternet$xSecurity measures 608 $aElectronic books. 615 0$aComputer security. 615 0$aInternet$xSecurity measures. 676 $a005.8 700 $aWyler$b Neil R$01046115 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910455679703321 996 $aAggressive network self-defense$92472808 997 $aUNINA