Adversarial Tradecraft in Cybersecurity

Offense versus defense in real-time computer conflict



Bookstore > Books > Adversarial Tradecraft in Cybersecurity

Price$32.00 - $44.76
Rating
AuthorDan Borges
PublisherPackt Publishing
Published2021
Pages246
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-101801076200
ISBN-139781801076203
EBook Hardcover Paperback

Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.

This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place.
Throughout this book, you will learn how to gain an advantage over opponents by disappearing from what they can detect. You will further understand how to blend in, uncover other actors' motivations and means, and learn to tamper with them to hinder their ability to detect your presence. Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation.

By the end of this book, you will have achieved a solid understanding of cyberattacks from both an attacker's and a defender's perspective.




5 5 18

Similar Books


Cybersecurity for Executives

Cybersecurity for Executives

by Gregory J. Touhill, C. Joseph Touhill

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business.Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; Covers 'What to Do When You Get Hacked?' ...

Price:  $70.81  |  Publisher:  Wiley  |  Release:  2014

Python for Cybersecurity

Python for Cybersecurity

by Howard E. Poston

Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and o...

Price:  $14.65  |  Publisher:  Wiley  |  Release:  2022

Essential Cybersecurity Science

Essential Cybersecurity Science

by Josiah Dykstra

If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You'll learn how to conduct scientific experiments on everyday tools and procedures, wh...

Price:  $24.50  |  Publisher:  O'Reilly Media  |  Release:  2015

Cybersecurity Career Guide

Cybersecurity Career Guide

by Alyssa Miller

Cybersecurity Career Guide unlocks your pathway to becoming a great security practitioner. You'll learn how to reliably enter the security field and quickly grow into your new career, following clear, practical advice that's based on research and interviews with hundreds of hiring managers. Practical self-analysis exercises iden...

Price:  $34.69  |  Publisher:  Manning  |  Release:  2022

Essential Mathematics for Quantum Computing

Essential Mathematics for Quantum Computing

by Leonard S. Woody III

Quantum computing is an exciting subject that offers hope to solve the world's most complex problems at a quicker pace. It is being used quite widely in different spheres of technology, including cybersecurity, finance, and many more, but its concepts, such as superposition, are often misunderstood because engineers may not know the ...

Price:  $44.99  |  Publisher:  Packt Publishing  |  Release:  2022

Cybersecurity Incident Response

Cybersecurity Incident Response

by Eric C. Thompson

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.Surviving an incident, or a breach, requires the b...

Price:  $24.90  |  Publisher:  Apress  |  Release:  2018

GANs in Action

GANs in Action

by Jakub Langr, Vladimir Bok

GANs in Action teaches you how to build and train your own Generative Adversarial Networks, one of the most important innovations in deep learning. In this book, you'll learn how to start building your own simple adversarial system as you explore the foundation of GAN architecture: the generator and discriminator networks.Generative ...

Price:  $39.99  |  Publisher:  Manning  |  Release:  2019

Introduction to Search with Sphinx

Introduction to Search with Sphinx

by Andrew Aksyonoff

This concise introduction to Sphinx shows you how to use this free software to index an enormous number of documents and provide fast results to both simple and complex searches. Written by the creator of Sphinx, this authoritative book is short and to the point....

Price:  $16.70  |  Publisher:  O'Reilly Media  |  Release:  2011