|Listed in category:
Have one to sell?

Matthew Monte Network Attacks and Exploitation (Paperback) (UK IMPORT)

Another great item from Rarewaves | Free delivery!
Condition:
Brand New
5 available
Breathe easy. Returns accepted.
Shipping:
Does not ship to United States. See detailsfor shipping
Located in: GU14 0GT, United Kingdom
Delivery:
Varies
Returns:
30 days return. Buyer pays for return shipping. See details- for more information about returns
Payments:
     

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. 

Seller information

Registered as a Business Seller
Seller assumes all responsibility for this listing.
eBay item number:276094856574
Last updated on May 08, 2024 15:32:40 EDTView all revisionsView all revisions

Item specifics

Condition
Brand New: A new, unread, unused book in perfect condition with no missing or damaged pages. See the ...
Book Title
Network Attacks and Exploitation
Publication Name
Network Attacks and Exploitation : a Framework
Title
Network Attacks and Exploitation
Subtitle
A Framework
Author
Matthew Monte
Format
Trade Paperback
EAN
9781118987124
ISBN
9781118987124
Publisher
Wiley & Sons, Incorporated, John
Genre
Computing & Internet
Release Year
2015
Release Date
11/08/2015
Language
English
Country/Region of Manufacture
US
Item Height
0.4in
Item Length
9.2in
Item Width
7.4in
Item Weight
13.3 Oz
Publication Year
2015
Type
Textbook
Number of Pages
224 Pages

About this product

Product Information

Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage.

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
1118987128
ISBN-13
9781118987124
eBay Product ID (ePID)
203851166

Product Key Features

Author
Matthew Monte
Publication Name
Network Attacks and Exploitation : a Framework
Format
Trade Paperback
Language
English
Publication Year
2015
Type
Textbook
Number of Pages
224 Pages

Dimensions

Item Length
9.2in
Item Height
0.4in
Item Width
7.4in
Item Weight
13.3 Oz

Additional Product Features

Lc Classification Number
Tk5105.59
Table of Content
Introduction xvii Chapter 1 Computer Network Exploitation 1 Operations 4 Operational Objectives 5 Strategic Collection 6 Directed Collection 7 Non-Kinetic Computer Network Attack (CNA) 7 Strategic Access 9 Positional Access 9 CNE Revisited 11 A Framework for Computer Network Exploitation 11 First Principles 12 Principles 12 Themes 14 Summary 15 Chapter 2 The Attacker 17 Principle of Humanity 17 Life Cycle of an Operation 18 Stage 1: Targeting 19 Stage 2: Initial Access 22 Stage 3: Persistence 24 Stage 4: Expansion 25 Stage 5: Exfiltration 26 Stage 6: Detection 26 Principle of Access 27 Inbound Access 27 Outbound Access 29 Bidirectional Access 35 No Outside Access 35 Access Summary 36 Principle of Economy 37 Time 37 Targeting Capabilities 37 Exploitation Expertise 38 Networking Expertise 38 Software Development Expertise 39 Operational Expertise 40 Operational Analysis Expertise 40 Technical Resources 41 Economy Summary 41 Attacker Structure 41 Summary 43 Chapter 3 The Defender 45 Principle of Humanity 45 Humanity and Network Layout 46 Humanity and Security Policy 47 Principle of Access 48 The Defensive Life Cycle 49 Principle of Economy 51 The Helpful Defender 53 Summary 54 Chapter 4 Asymmetries 55 False Asymmetries 56 Advantage Attacker 59 Motivation 60 Initiative 61 Focus 62 Effect of Failure 62 Knowledge of Technology 64 Analysis of Opponent 64 Tailored Software 65 Rate of Change 66 Advantage Defender 67 Network Awareness 68 Network Posture 68 Advantage Indeterminate 69 Time 69 Efficiency 70 Summary 71 Chapter 5 Attacker Frictions 73 Mistakes 74 Complexity 74 Flawed Attack Tools 75 Upgrades and Updates 77 Other Attackers 78 The Security Community 80 Bad Luck 81 Summary 81 Chapter 6 Defender Frictions 83 Mistakes 83 Flawed Software 84 Inertia 86 The Security Community 87 Complexity 89 Users 91 Bad Luck 92 Summary 92 Chapter 7 Offensive Strategy 93 Principle 1: Knowledge 95 Measuring Knowledge 96 Principle 2: Awareness 97 Measuring Awareness 98 Principle 3: Innovation 98 Measuring Innovation 99 Defensive Innovation 100 Principle 4: Precaution 101 Measuring Precaution 103 Principle 5: Operational Security 105 Minimizing Exposure 106 Minimizing Recognition 107 Controlling Reaction 108 Measuring Operational Security 109 Principle 6: Program Security 110 Attacker Liabilities 110 Program Security Costs 112 Measuring Program Security 120 Crafting an Offensive Strategy 121 Modular Frameworks 124 A Note on Tactical Decisions 126 Summary 127 Chapter 8 Defensive Strategy 129 Failed Tactics 130 Antivirus and Signature-Based Detection 130 Password Policies 132 User Training 134 Crafting a Defensive Strategy 135 Cloud-Based Security 143 Summary 145 Chapter 9 Offensive Case Studies 147 Stuxnet 148 Access 148 Economy 149 Humanity 149 Knowledge 149 Awareness 149 Precaution 150 Innovation 151 Operational Security 151 Program Security 153 Stuxnet Summary 154 Flame 154 Gauss 157 Dragonfly 159 Red October 160 APT 1 162 Axiom 164 Summary 165 Epilogue 167 Appendix Attack Tools 169 Antivirus Defeats 169 Audio/Webcam Recording 170 Backdoor 170 Bootkit 171 Collection Tools 171 Exploits 171 Fuzzer 172 Hardware-based Trojan 172 Implant 173 Keystroke Logger 173 Network Capture 173 Network Survey 173 Network Tunnel 174 Password Dumpers and Crackers 174 Packer 175 Persistence Mechanism 175 Polymorphic Code Generator 177 Rootkit 178 Screen Scraper 178 System Survey 178 Vulnerability Scanner 178 References 179 Bibliography 189 Index 193
Copyright Date
2015
Topic
Security / Networking
Lccn
2015-941933
Dewey Decimal
005.8
Intended Audience
Trade
Dewey Edition
23
Illustrated
Yes
Genre
Computers

Item description from the seller

Business seller information

Value Added Tax Number:
  • GB 864 1548 11
Rarewaves Canada

Rarewaves Canada

98.4% positive feedback
461K items sold

Detailed seller ratings

Average for the last 12 months

Accurate description
4.9
Reasonable shipping cost
5.0
Shipping speed
4.8
Communication
4.9

Seller feedback (183,203)

u***n (38)- Feedback left by buyer.
Past 6 months
Verified purchase
Product is 95% alike picture but a little more blurry. Controller play well but had a notice from psn that my joypad wasn't authentic and could by problematic🤷‍♂️ no trouble so far! Shipping was fast but no tracking and worst packaging ever.. like the box came banged up... send a question to seller never had a reply 😅.... Good product overall, excellent price, fast shipping, wrapped only on 4 sides out of 6, no tracking and never reply... 4★ product / 2★ seller ✌️
l***t (120)- Feedback left by buyer.
Past 6 months
Verified purchase
The book is in perfect condition, brand new, and is exactly as described. This item is difficult to find here, and the seller priced it very reasonably. It shipped from the UK to Canada, and unfortunately took a little longer to arrive than the seller hoped, but it was shipped less than 24 hours after I purchased. When I contacted the seller, they were very responsive and helpful. I would not hesitate to purchase from this seller again. Definitely recommend!
s***a (696)- Feedback left by buyer.
Past 6 months
Verified purchase
AAA seller. Item came as described and within the due date. Great communication. Well packed and no damage to the case.

Product ratings and reviews

No ratings or reviews yet
Be the first to write the review.