語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advanced persistent security = a cyb...
~
Gomes, Araceli Treu,
Advanced persistent security = a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Advanced persistent security/ Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor.
其他題名:
a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
作者:
Winkler, Ira,
其他作者:
Shackleford, Dave,
出版者:
Cambridge, MA :Syngress, : 2017.,
面頁冊數:
1 online resource.
附註:
Includes index.
標題:
COMPUTERS - Security -
電子資源:
https://www.sciencedirect.com/science/book/9780128093160
ISBN:
9780128093658 (electronic bk.)
Advanced persistent security = a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
Winkler, Ira,
Advanced persistent security
a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /[electronic resource] :Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor. - Cambridge, MA :Syngress,2017. - 1 online resource.
Includes index.
What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures --Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Knowyourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security.
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
ISBN: 9780128093658 (electronic bk.)Subjects--Topical Terms:
811590
COMPUTERS
--SecurityIndex Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Advanced persistent security = a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
LDR
:02328cam a2200265 a 4500
001
1042947
006
m o d
007
cr cnu---unuuu
008
211216s2017 maua go 001 0 eng d
020
$a
9780128093658 (electronic bk.)
020
$a
012809365X (electronic bk.)
020
$a
9780128093160
020
$a
0128093161
035
$a
(OCoLC)962064634
035
$a
ocn962064634
040
$a
IDEBK
$b
eng
$c
IDEBK
$d
EBLCP
$d
N$T
$d
UMI
$d
OCLCF
$d
STF
$d
DEBBG
$d
IDB
$d
OPELS
$d
UPM
$d
GGVRL
$d
MERER
$d
OCLCQ
$d
YDX
$d
OTZ
$d
OCLCQ
$d
MERUC
$d
OCLCA
$d
D6H
$d
U3W
$d
UOK
$d
CEF
$d
KSU
$d
OCLCQ
$d
S2H
$d
OCLCO
$d
VLY
$d
HS0
041
0
$a
eng
050
4
$a
TK5105.59
082
0 4
$a
005.8
$2
23
100
1
$a
Winkler, Ira,
$e
author.
$3
1343671
245
1 0
$a
Advanced persistent security
$h
[electronic resource] :
$b
a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
$c
Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor.
260
$a
Cambridge, MA :
$b
Syngress,
$c
2017.
300
$a
1 online resource.
500
$a
Includes index.
505
0
$a
What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures --Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Knowyourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security.
520
$a
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
650
7
$a
COMPUTERS
$x
Security
$x
General.
$2
bisacsh
$3
811590
650
0
$a
Hacking.
$3
1163447
650
0
$a
Computer security.
$3
557122
650
0
$a
Computer networks
$x
Security measures.
$3
555385
655
0
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Shackleford, Dave,
$e
editor.
$3
1343673
700
1
$a
Gomes, Araceli Treu,
$e
author.
$3
1343672
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128093160
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入