Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Advanced persistent security = a cyb...
~
Gomes, Araceli Treu,
Advanced persistent security = a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Advanced persistent security/ Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor.
Reminder of title:
a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
Author:
Winkler, Ira,
other author:
Gomes, Araceli Treu,
Published:
Cambridge, MA :Syngress, : 2017.,
Description:
1 online resource.
Notes:
Includes index.
Subject:
Computer networks - Security measures. -
Online resource:
https://www.sciencedirect.com/science/book/9780128093160
ISBN:
9780128093658 (electronic bk.)
Advanced persistent security = a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
Winkler, Ira,
Advanced persistent security
a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /[electronic resource] :Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor. - Cambridge, MA :Syngress,2017. - 1 online resource.
Includes index.
What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures --Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Knowyourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security.
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
ISBN: 9780128093658 (electronic bk.)Subjects--Topical Terms:
555385
Computer networks
--Security measures.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Advanced persistent security = a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
LDR
:02328cam a2200265 a 4500
001
1042947
006
m o d
007
cr cnu---unuuu
008
211216s2017 maua go 001 0 eng d
020
$a
9780128093658 (electronic bk.)
020
$a
012809365X (electronic bk.)
020
$a
9780128093160
020
$a
0128093161
035
$a
(OCoLC)962064634
035
$a
ocn962064634
040
$a
IDEBK
$b
eng
$c
IDEBK
$d
EBLCP
$d
N$T
$d
UMI
$d
OCLCF
$d
STF
$d
DEBBG
$d
IDB
$d
OPELS
$d
UPM
$d
GGVRL
$d
MERER
$d
OCLCQ
$d
YDX
$d
OTZ
$d
OCLCQ
$d
MERUC
$d
OCLCA
$d
D6H
$d
U3W
$d
UOK
$d
CEF
$d
KSU
$d
OCLCQ
$d
S2H
$d
OCLCO
$d
VLY
$d
HS0
041
0
$a
eng
050
4
$a
TK5105.59
082
0 4
$a
005.8
$2
23
100
1
$a
Winkler, Ira,
$e
author.
$3
1343671
245
1 0
$a
Advanced persistent security
$h
[electronic resource] :
$b
a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
$c
Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor.
260
$a
Cambridge, MA :
$b
Syngress,
$c
2017.
300
$a
1 online resource.
500
$a
Includes index.
505
0
$a
What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures --Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Knowyourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security.
520
$a
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer security.
$3
557122
650
0
$a
Hacking.
$3
1163447
650
7
$a
COMPUTERS
$x
Security
$x
General.
$2
bisacsh
$3
811590
655
0
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Gomes, Araceli Treu,
$e
author.
$3
1343672
700
1
$a
Shackleford, Dave,
$e
editor.
$3
1343673
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128093160
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login