|Print List Price:||$20.00|
Save $10.01 (50%)
Offensive Countermeasures: The Art of Active Defense Kindle Edition
|New from||Used from|
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
Customers Who Bought This Item Also Bought
Top Customer Reviews
I read this book today, and poked most of the modules in the ADHD CD.
This book tries to break the mold that hacking back is never okay.
What I found most interesting is the emphasis on NOT hacking the hackers. At least not now.
The emphasis is on obfuscation and data collection before (or if) taking any active action.
This book is not heavy on technical details - nor should it be.
It's trying to convey a new concept.
If you want to hack someone - there are plenty of technical resources on how to hack something. This book offers some ideas on an interesting and new line of thought.
I remember coding countermeasures in the early days designed specifically to take compromised systems promiscuously engaged in the act of attacking other systems off-line and display a helpful boot screen for the target systems' administrators. We were never destructive or vindictive and always treated such responses unapologetically as self-defense; because that is exactly what it was.
Law enforcement does not protect, moves at glacial speeds, and will generally defer from action unless a successful prosecution is assured (or the pubic noise level demands it). (Don't misunderstand me, I have the highest respect for first responders.) It is therefore incumbent for those of us with the skills to responsibly protect our infrastructure using measured responses consistent with threat level.
OCM does exactly what it intends by succinctly covering the important elements of this neglected topic and furthers a much needed discussion. Highly recommended.
The book is ontended to give some hands on tools for active cyber defense. If you are looking for a deep explanation of how the variuos tools work then look elsewhere. If you want a quick and dirty set of tools that help you set up an active defense environment then this is the book.
Most Recent Customer Reviews
If you are in the security game read this book! Implement what you can, the seek out and destroy the enemy, with fire and maneuver.Published 15 months ago by Jason
This book is a collection of man pages and screenshots. Paul could have easily published three blog posts on his site with a few links and we all could have saved some trees. Read morePublished 20 months ago by Christian
Great collection of offensive tools - and summary of their capabilities. Now it is up to you to seek them out, learn how to use them and - defend yourself! Read morePublished 21 months ago by Linda G Lesselyoung
This is a great read for someone that has already spent some time doing Information Security on either the offensive or defensive side. Read morePublished on April 14, 2014 by Colin Edwards
This is a great book to have at the ready for when you need it. John & Paul really know their stuff. Terrific resource, highly recommended.Published on April 9, 2014 by desktopyou
Well put information, font size could use some work. Overall GREAT material with cativatig and well put follow-along demonstrations. Good purchasePublished on March 1, 2014 by Lloyd