User talk:Jzalinsky599/Reverse deception/Bibliography

The content in this book can be used as guide for people and business a like by showing how a network can be exploited and how to asses and handle the vulnerabilities of a given network. Furthermore, the author provides a full analysis of the both legal and ethical issues that can arise when protecting a given network. Finally, this book provides exact procedures that the reader may follow to protect their information such as; identifying, analyzing, and blocking APTs