Kindle Price: $9.99

Save $10.01 (50%)

Read this title for free. Learn more
Read for Free
with Kindle Unlimited
OR

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

Deliver to your Kindle or other device

Deliver to your Kindle or other device

Offensive Countermeasures: The Art of Active Defense by [Strand, John, Paul Asadoorian, Ethan Robish, Benjamin Donnelly]
Kindle App Ad

Offensive Countermeasures: The Art of Active Defense Kindle Edition

4.4 out of 5 stars 35 customer reviews

See all 3 formats and editions Hide other formats and editions
Price
New from Used from
Kindle
"Please retry"
$9.99

Length: 239 pages Enhanced Typesetting: Enabled Page Flip: Enabled

click to open popover

Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.


Editorial Reviews

About the Author

John Strand is a member of PaulDotCom Security Weekly, Owner of Black Hills Information Security and a instructor with the SANS Institute. Paul Asadoorian is the founder of PaulDotCom Security Weekly.

Product Details

  • File Size: 5736 KB
  • Print Length: 239 pages
  • Publisher: PaulDotCom; 1 edition (June 10, 2013)
  • Publication Date: June 10, 2013
  • Sold by: Amazon Digital Services LLC
  • Language: English
  • ASIN: B00DQSQ7QY
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Lending: Enabled
  • Enhanced Typesetting: Enabled
  • Amazon Best Sellers Rank: #363,427 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images or tell us about a lower price?

Customer Reviews

Top Customer Reviews

Format: Kindle Edition Verified Purchase
Nice to read but I think it fell short on the technical side. It would have been a lot better if it included more how materials or technical references so we could use it to bulid proof of concept projects.
Comment 6 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
The book expands upon the tools and concepts utilized in the active defense suite. I purchased the book, because I appreciate the work they have put into that suite. That being said, I feel the book leaves a lot to be desired. The whole book seems rushed. Typos and errors abound. I was also expecting a little more depth into legality. For those new to the idea of actively defending networks or security in general, this is still a good read. For those with a little more experience, just view the Derbycon talk and download AD.
Comment 4 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
As the book states: get your house in order first, and then go out and play.

I read this book today, and poked most of the modules in the ADHD CD.

This book tries to break the mold that hacking back is never okay.
What I found most interesting is the emphasis on NOT hacking the hackers. At least not now.

The emphasis is on obfuscation and data collection before (or if) taking any active action.

This book is not heavy on technical details - nor should it be.
It's trying to convey a new concept.

If you want to hack someone - there are plenty of technical resources on how to hack something. This book offers some ideas on an interesting and new line of thought.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
However, the book could use an editor. As many other reviewers have noted, the specific methods to implement the active defenses are missing or only briefly described; but this book is an introduction, not an implementation manual. When they publish a second edition, I would recommend: (1) a table of contents, (2) an index, (3) spelling out acronyms or including an acronym table, (4) using some sort of style guide for references (e.g., IEEE, APA), (5) providing legible graphics (i.e., several screenshots are grainy and hard to read, (6) provide references to figures and graphics; its not always clear where in the text the explanation of the graphics exist, (7) add page numbers, (8) use consistent fonts and line spacing. These many minor issues combine to make this otherwise very readable book a challenge to get through. I’d give the book 5 stars on content and 3 on execution.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
Overall this book provides a good review of high level concepts with some minor depth of what organizations can do to better protect their assets using both defensive and offensive strategies. I was just hoping for a more technical explanation, and more advanced techniques, but the book does cover what it states. I really hope that there will be a continuation of discussions and more information released regarding this topic and the future of where cyber security / warfare will bring us
Comment 2 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
Those who overlook countermeasures as an integral component of security will surely fail in their roles as protectors. OCM is an excellent overview of the topic and a better than entry level introduction.

I remember coding countermeasures in the early days designed specifically to take compromised systems promiscuously engaged in the act of attacking other systems off-line and display a helpful boot screen for the target systems' administrators. We were never destructive or vindictive and always treated such responses unapologetically as self-defense; because that is exactly what it was.

Law enforcement does not protect, moves at glacial speeds, and will generally defer from action unless a successful prosecution is assured (or the pubic noise level demands it). (Don't misunderstand me, I have the highest respect for first responders.) It is therefore incumbent for those of us with the skills to responsibly protect our infrastructure using measured responses consistent with threat level.

OCM does exactly what it intends by succinctly covering the important elements of this neglected topic and furthers a much needed discussion. Highly recommended.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
This book is good for what it is. It is not an academic InfoSec book.

The book is ontended to give some hands on tools for active cyber defense. If you are looking for a deep explanation of how the variuos tools work then look elsewhere. If you want a quick and dirty set of tools that help you set up an active defense environment then this is the book.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
The authors did a good job of coming up with countermeasures that few people are talking about these days. Time will tell, but this book may be 5 years ahead of its time. The traditional model of using passive defenses such as IDS/IPS and AV simply aren't working that well anymore. I read this cover to cover in two sittings and plan on referring back to it. There are some fresh strategies that are worth reviewing and discussion of their merits.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews

Set up an Amazon Giveaway

Offensive Countermeasures: The Art of Active Defense
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more about Amazon Giveaway
This item: Offensive Countermeasures: The Art of Active Defense