A computer that has been attacked by a botnet is a hostage to a criminal orgainzation. Computers that receive viruses, worms and malware in the form of a "bot" literally have their computers opened up to the botnet, a network of computers controlled by a main interface. Infected computers are then manipulated by attackers to make money. This book presents a framework in which to understand botnets completely, starting with botnet construction and economics, as well as Web 2.0 and mobile botnets. Detection and analysis of a botnet is the next step for an IT or IS professional and this book details tools and techniques, along with honeypots, darknets and snares. Finally, find out how to take down a botnet by taking a computer back, working with outside consultants and creating a comprehensive defense against future botnets. Offers an investigative look into how botnets and those that make them cause so much havocDetails how you can distribute countermeasures in advance of the next big botnetDiscusses methodologies that can be used on the entire family of botnets