Over the past year there has been a shift within the computer security world away from passive, reactive defence towards more aggressive, proactive counter-measures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter- measures used to nullify the actions of an attacking, criminal hacker.