Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Aggressive Network Self-Defense 1st Edition

4.3 out of 5 stars 8 customer reviews
ISBN-13: 978-1931836203
ISBN-10: 1931836205
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$44.44 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$54.44 On clicking this link, a new layer will be open
More Buying Choices
21 New from $14.40 23 Used from $7.99
Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Windows10ForDummiesVideo
Windows 10 For Dummies Video Training
Get up to speed with Windows 10 with this video training course from For Dummies. Learn more.
$54.44 FREE Shipping. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.
click to open popover

Frequently Bought Together

  • Aggressive Network Self-Defense
  • +
  • Secrets of Computer Espionage: Tactics and Countermeasures
  • +
  • How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life
Total price: $100.43
Buy the selected items together

Editorial Reviews

About the Author

Neil R. Wyler (JNCIS-FWV, JNCIA-SSL) is an Information Security Engineer and Researcher located on the Wasatch Front in Utah. He is the co-owner of two Utah-based businesses, which include a consulting firm with clients worldwide and a small software start-up. He is currently doing contract work for Juniper Networks, working with the company’s Security Products Group. Neil is a staff member of the Black Hat Security Briefings and Def Con hacker conference. He has spoken at numerous security conferences and been the subject of various online, print, film, and television interviews regarding different areas of information security. He was the Lead Author and Technical Editor of Aggressive Network Self-Defense (Syngress, 1-931836-20-5) and serves on the advisory board for a local technical college.
NO_CONTENT_IN_FEATURE
The latest book club pick from Oprah
"The Underground Railroad" by Colson Whitehead is a magnificent novel chronicling a young slave's adventures as she makes a desperate bid for freedom in the antebellum South. See more

Product Details

  • Paperback: 448 pages
  • Publisher: Syngress; 1 edition (February 26, 2005)
  • Language: English
  • ISBN-10: 1931836205
  • ISBN-13: 978-1931836203
  • Product Dimensions: 7 x 1 x 9.4 inches
  • Shipping Weight: 1.3 pounds (View shipping rates and policies)
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (8 customer reviews)
  • Amazon Best Sellers Rank: #1,293,804 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

Format: Paperback
Continuing in the new theme of fiction and technical how-to, Aggressive Network Self-Defense brings together several authors to provide a wide range of material. Syngress' niche in this space seems to be breaking new ground -- and for the most part, it works. While you don't get as in-depth a treatment as a typical technical book gives you, there is an added dimension: namely, a more realistic scenario of how these tools fit together in a real, live series of actions.

Not being a big fan of most fiction (I tend to prefer history), it's hard to say definitively good or bad things about the quality of the writing. What I can say is that it's infinitely less irritating, and far more realistic, than Neal Stephenson's Cryptonomicon or Gibson's Neuromancer. No over-the-top smearing of adjectives to describe the mundane, and no unrealistic sequences of events. Then again, there's no character development and no real story progression, so it's not great fiction.

As a series of hacker vignettes, the book works just fine, and very well for the purposes at hand. Basically, what the authors want you to get from the book is two-fold: First, they want you to debate the issues around "strike back" attack methodologies. Several of the authors are open advocates of what are legal grey areas and open moral questions in the field of network security. Secondly, they want you to see how it's done, what you do when you actually use a tool to achieve a goal. Most books that do this, like Hacking Exposed, cover far more tools, but they usually do so without showing you each tool's use in a real-world scenario.

I won't bore you with a lengthy, detailed overview of the first part of the book. Like I said, it's a series of part fiction, part tutorial series of short stories.
Read more ›
Comment 13 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Most computer security books focus on how to defend a computer system or network from outside attack: that's the basic difference between them and Neil R. Wylder's Aggressive Network Self-Defense: I'm Mad As Hell, And I'm Not Gonna Take It Anymore! The focus here is on the technical, legal and financial ramifications of a 'strike-back' and 'active defense' program which promotes doing more than just defense. Chapters cover 'cyber dogfights' between hackers and defender/attackers, offers up tales of revenge and following the trail of an attacker, accounts of fights at different network levels, and stories of problem-solving in network attacks. Both fictional and many real-life scenarios are covered, with plenty of technical computer detail. A lively, satisfying book for all levels of computer user, but particularly administrators who want to do more than just defend.
Comment 6 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
The title of this book says "Agressive." A better word might be "Vigilante."

I live in the west. Vigilante's came about because the law enforcement of the time was to weak to handle the problems. I don't know but that this is the situation out on the internet. I understand that CoolWebSearch is written/distributed from Russia. Who is going to go tell them that I don't want their stuff on my machine?

This book presents a series of "fictional" incidents where people being attacked strike back using technological means. Most of the time the police get involved at the end, usually finding the wrong man. None the less, the stories do an excellent job of describing how "aggressive" network defenders might attempt to strike back at attackers. These stories are certainly a more interesting approach than the typical computer manual.

The second part of the manual gets more technical and describes in greater depth the tools and techniques that the defenders in the fictional stories use.

The whole book brings up a series of moral questions. Where do you just build walls and defenses vs. where do you go out and counter-attack the attackers? Where are you counter-attacking illegally, with the potential to get caught yourself? It's quite a book and perhaps a sign of the coming times.
Comment 8 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
I actually read a book titled, "Chained Exploits: Advanced Hacking Attacks From Start to Finish," and could not believe that I've come across such a book. I thought it was absolutely hilarious, but also worrisome, as to how such a book can be available on the market. They claim that in order to learn how to protect yourself, you need to understand the behavior of a hacker. Whatever the intended purpose of the book, at the time when I bought it, my reason for buying it was because I was trying to learn in-depth knowledge about Cross Site Scripting vulnerabilities. All the other books I've read never helped me learn XSS. So, when I came across "Chained Exploits: Advanced Hacking Attacks From Start to Finish," it didn't teach XSS attacks even though I was wishing it would. But, it was a unique kind of book that surprised me in how it shows you fictional, yet very real-to-life hacking examples. I was so enthusiastic about that book, and was hoping to find a similar book from other publishers, so that I can have a broader understanding of hacking attacks from a start-to-finish, story-based prospective. Disappointed, I was unable to find what I was searching for.

Then, I decided to purchase Aggressive Network Self-Defense. Upon reading some of it, I felt completely satisfied because I finally found a book that to me was a continuation of the first book I had read, "Chained Exploits: Advanced Hacking Attacks From Start to Finish." Aggressive Network Self-Defense is a Syngress publication, and I wanted to find a book from Syngress on the subject. And I was glad that I did!

It basically has chapters that all follow a certain story of its own. The whole idea is how someone is trying to hack, and they explain the details of how its being performed.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

Aggressive Network Self-Defense
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more about Amazon Giveaway
This item: Aggressive Network Self-Defense

Pages with Related Products. See and discover other items: computing