Adversarial Tradecraft in Cybersecurity
Offense versus defense in real-time computer conflict
Price | $32.00 - $44.76
|
Rating | |
Author | Dan Borges |
Publisher | Packt Publishing |
Published | 2021 |
Pages | 246 |
Language | English |
Format | Paper book / ebook (PDF) |
ISBN-10 | 1801076200 |
ISBN-13 | 9781801076203 |
Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.
This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place.
Throughout this book, you will learn how to gain an advantage over opponents by disappearing from what they can detect. You will further understand how to blend in, uncover other actors' motivations and means, and learn to tamper with them to hinder their ability to detect your presence. Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation.
By the end of this book, you will have achieved a solid understanding of cyberattacks from both an attacker's and a defender's perspective.
- Dan Borges
5 5 18
Similar Books
by Gregory J. Touhill, C. Joseph Touhill
Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business.Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; Covers 'What to Do When You Get Hacked?' ...
Price: $70.81 | Publisher: Wiley | Release: 2014
by Howard E. Poston
Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and o...
Price: $14.65 | Publisher: Wiley | Release: 2022
Essential Cybersecurity Science
by Josiah Dykstra
If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You'll learn how to conduct scientific experiments on everyday tools and procedures, wh...
Price: $24.50 | Publisher: O'Reilly Media | Release: 2015
by Alyssa Miller
Cybersecurity Career Guide unlocks your pathway to becoming a great security practitioner. You'll learn how to reliably enter the security field and quickly grow into your new career, following clear, practical advice that's based on research and interviews with hundreds of hiring managers. Practical self-analysis exercises iden...
Price: $34.69 | Publisher: Manning | Release: 2022
Essential Mathematics for Quantum Computing
by Leonard S. Woody III
Quantum computing is an exciting subject that offers hope to solve the world's most complex problems at a quicker pace. It is being used quite widely in different spheres of technology, including cybersecurity, finance, and many more, but its concepts, such as superposition, are often misunderstood because engineers may not know the ...
Price: $44.99 | Publisher: Packt Publishing | Release: 2022
Cybersecurity Incident Response
by Eric C. Thompson
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.Surviving an incident, or a breach, requires the b...
Price: $24.90 | Publisher: Apress | Release: 2018
by Jakub Langr, Vladimir Bok
GANs in Action teaches you how to build and train your own Generative Adversarial Networks, one of the most important innovations in deep learning. In this book, you'll learn how to start building your own simple adversarial system as you explore the foundation of GAN architecture: the generator and discriminator networks.Generative ...
Price: $39.99 | Publisher: Manning | Release: 2019
Introduction to Search with Sphinx
by Andrew Aksyonoff
This concise introduction to Sphinx shows you how to use this free software to index an enormous number of documents and provide fast results to both simple and complex searches. Written by the creator of Sphinx, this authoritative book is short and to the point....
Price: $16.70 | Publisher: O'Reilly Media | Release: 2011