
- Know Your Enemy: Learning about Security Threats (2nd Edition)
-
Amazon
From $42.53 (New)

From $42.53 (New)

| Latest | $42.53 Apr 16, '16 |
| Highest | $45.94 Jul 24, '15 |
| Lowest | $30.21 Oct 23, '15 |
| Average | $42.53 (30d avg) $42.53 (90d avg) $42.20 (180d avg) $42.41 (365d avg) $41.47 (Lifetime average) |
| Added | Feb 10, 2014 |
| Latest | $29.94 Apr 16, '16 |
| Highest | $35.11 Jan 18, '15 |
| Lowest | $24.90 Aug 27, '14 |
| Average | $30.51 (30d avg) $30.91 (90d avg) $31.86 (180d avg) $31.72 (365d avg) $29.87 (Lifetime average) |
| Added | Feb 10, 2014 |
| Latest | $19.00 Apr 16, '16 |
| Highest | $31.00 May 20, '15 |
| Lowest | $1.14 Sep 29, '15 |
| Average | $16.36 (30d avg) $16.31 (90d avg) $15.44 (180d avg) $16.08 (365d avg) $12.62 (Lifetime average) |
| Added | Feb 10, 2014 |
30 day average: 853,793
90 day average: 906,699
--Marcus J. Ranum, Senior Scientist, TrueSecure Corp.
--Jennifer Kolde, security consultant, author, and instructor "Know Your Enemy
--William Robinson, former security training program manager at Sun Microsystems, curriculum coordinator for Fire Protection Publications.
--Sean Brown, IT Director, Applied Geographics, Inc.
--Kirby Kuehl, Cisco Systems "Know Your Enemy
--Laurent Oudot, security engineer, CEA
--Marcus J. Ranum, senior scientist, TruSecure Corp. For centuries, military organizations have relied on scouts to gather intelligence about the enemy. In the field of information security, few scouts have ever existed. Very few organizations today know who their enemies are, how they might attack, when they might attack, and, perhaps most important, why they attack. If the blackhat community is the enemy, then the Honeynet Project is a most valuable ally. In this completely revised and greatly expanded follow-up to their groundbreaking book, members of the Honeynet Project, the Alliance, and the community (including Lance Spitzner, Brian Carrier, Anton Chuvakin, Eric Cole, Yannis Corovesis, Max Kilger, and Rob Lee) provide an unrivaled "intelligence report" on those who use the Internet for destructive purposes. They also provide an in-depth guide to honeynets--high-interaction honeypots designed to capture extensive information on exactly how your enemies operate so you can protect your systems from them. Inside, you'll find extensive information on: Aimed at security professionals, but containing much information that is relevant for those with less technical backgrounds, this book teaches the technical skills needed to study and learn from a blackhat attack.