This book introduces cyber-security defensive tactics to annoy attackers, gain attribution and insight on who and where they are. It discusses how to attack attackers in a way which is legal and incredibly useful. It is time to start looking beyond traditional IDS/IPS/AV technologies...