Cargando…

Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risk...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Winkler, Ira (Autor), Gomes, Araceli Treu (Autor)
Otros Autores: Shackleford, Dave (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, MA : Syngress, [2017]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn962064634
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 161102s2017 mau o 001 0 eng d
040 |a IDEBK  |b eng  |e rda  |e pn  |c IDEBK  |d EBLCP  |d N$T  |d UMI  |d OCLCF  |d STF  |d DEBBG  |d IDB  |d OPELS  |d UPM  |d GGVRL  |d MERER  |d OCLCQ  |d YDX  |d OTZ  |d OCLCQ  |d MERUC  |d OCLCA  |d D6H  |d U3W  |d UOK  |d CEF  |d KSU  |d OCLCQ  |d S2H  |d OCLCO  |d VLY  |d HS0  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO 
019 |a 961910106  |a 961931707  |a 962419829  |a 1162539862  |a 1227642525 
020 |a 9780128093658  |q (electronic bk.) 
020 |a 012809365X  |q (electronic bk.) 
020 |z 9780128093160 
020 |z 0128093161 
029 1 |a AU@  |b 000059703207 
029 1 |a AU@  |b 000061154014 
029 1 |a AU@  |b 000066135890 
029 1 |a AU@  |b 000068128258 
029 1 |a CHBIS  |b 011069431 
029 1 |a CHNEW  |b 001013919 
029 1 |a CHVBK  |b 499787609 
029 1 |a DEBBG  |b BV043970550 
029 1 |a DEBSZ  |b 485810247 
029 1 |a GBVCP  |b 882761463 
029 1 |a AU@  |b 000073414728 
035 |a (OCoLC)962064634  |z (OCoLC)961910106  |z (OCoLC)961931707  |z (OCoLC)962419829  |z (OCoLC)1162539862  |z (OCoLC)1227642525 
037 |a CL0500000800  |b Safari Books Online 
050 4 |a TK5105.59 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Winkler, Ira,  |e author. 
245 1 0 |a Advanced persistent security :  |b a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /  |c Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor. 
264 1 |a Cambridge, MA :  |b Syngress,  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed December 1, 2016). 
500 |a Includes index. 
520 |a Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face. 
505 0 |a What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures -- Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Know yourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Hacking. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Piratage informatique. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Hacking  |2 fast 
700 1 |a Gomes, Araceli Treu,  |e author. 
700 1 |a Shackleford, Dave,  |e editor. 
776 0 8 |i Print version:  |a Winkler, Ira.  |t Advanced persistent security.  |d ©2017  |z 0128093161  |z 9780128093160  |w (OCoLC)956626559 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128093658/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4730826 
938 |a EBSCOhost  |b EBSC  |n 1145032 
938 |a Gale Cengage Learning  |b GVRL  |n GVRL02VN 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis36880368 
938 |a YBP Library Services  |b YANK  |n 13239008 
994 |a 92  |b IZTAP