|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_on1156996260 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m d |
007 |
cr ||||||||||| |
008 |
200607s2020 enk o 000 0 eng d |
040 |
|
|
|a YDX
|b eng
|c YDX
|d N$T
|d EBLCP
|d UKAHL
|d OCLCF
|d UMI
|d NLW
|d UKMGB
|d OG$
|d UAB
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBC0G9118
|2 bnb
|
016 |
7 |
|
|a 019807518
|2 Uk
|
019 |
|
|
|a 1157083483
|a 1199337249
|
020 |
|
|
|a 1800205899
|q (electronic bk.)
|
020 |
|
|
|a 9781800205895
|q (electronic bk.)
|
020 |
|
|
|z 9781800206014
|
029 |
1 |
|
|a AU@
|b 000067299648
|
029 |
1 |
|
|a UKMGB
|b 019807518
|
035 |
|
|
|a (OCoLC)1156996260
|z (OCoLC)1157083483
|z (OCoLC)1199337249
|
037 |
|
|
|a CL0501000152
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Rains, Tim,
|e author.
|
245 |
1 |
0 |
|a Cybersecurity threats, malware trends, and strategies :
|b mitigate exploits, malware, phishing, and other social engineering attacks /
|c Tim Rains.
|
260 |
|
|
|a Birmingham :
|b Packt,
|c 2020.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Cover -- Copyright -- Packt Page -- Contributors -- Table of Contents -- Preface -- Chapter 1: Ingredients for a Successful Cybersecurity Strategy -- What is a cybersecurity strategy? -- How organizations get initially compromised and the cybersecurity fundamentals -- Unpatched vulnerabilities -- Security misconfigurations -- Weak, leaked, and stolen credentials -- Social engineering -- Insider threats -- Focus on the cybersecurity fundamentals -- Understanding the difference between the attacker's motivations and tactics -- Other ingredients for a successful strategy
|
505 |
8 |
|
|a Business objective alignment -- Cybersecurity vision, mission, and imperatives -- Senior executive and board support -- Understand the risk appetite -- Realistic view of current cybersecurity capabilities and technical talent -- Compliance program and control framework alignment -- An effective relationship between cybersecurity and IT -- Security culture -- Chapter summary -- References -- Chapter 2: Using Vulnerability Trends to Reduce Risk and Costs -- Introduction -- Vulnerability Management Primer -- Vulnerability Disclosure Data Sources -- Industry Vulnerability Disclosure Trends
|
505 |
8 |
|
|a Reducing Risk and Costs -- Measuring Vendor and Product Improvement -- Oracle Vulnerability Trends -- Apple Vulnerability Trends -- IBM Vulnerability Trends -- Google Vulnerability Trends -- Microsoft Vulnerability Trends -- Vendor Vulnerability Trend Summary -- Operating System Vulnerability Trends -- Microsoft Operating System Vulnerability Trends -- Windows XP Vulnerability Trends -- Windows 7 Vulnerability Trends -- Windows Server 2012 and 2016 Vulnerability Trends -- Windows 10 Vulnerability Trends -- Linux Kernel Vulnerability Trends -- Google Android Vulnerability Trends
|
505 |
8 |
|
|a Apple macOS Vulnerability Trends -- Operating Systems Vulnerability Trend Summary -- Web Browser Vulnerability Trends -- Internet Explorer Vulnerability Trends -- Microsoft Edge Vulnerability Trends -- Google Chrome Vulnerability Trends -- Mozilla Firefox Vulnerability Trends -- Apple Safari Vulnerability Trends -- Web Browser Vulnerability Trend Summary -- Vulnerability Management Guidance -- Chapter summary -- References -- Chapter 3: The Evolution of the Threat Landscape -- Malware -- Introduction -- Why is there so much malware on Windows compared to other platforms? -- Data sources
|
505 |
8 |
|
|a The Malicious Software Removal Tool -- Real-time anti-malware tools -- Non-security data sources -- About malware -- How malware infections spread -- Trojans -- Potentially unwanted software -- Exploits and exploit kits -- Worms -- Ransomware -- Viruses -- Browser modifiers -- Measuring malware prevalence -- Global windows malware infection analysis -- Regional windows malware infection analysis -- The long-term view of the threat landscape in the Middle East and Northern Africa -- 10-year regional report card for the Middle East and Northern Africa
|
520 |
|
|
|a It is challenging for an organization to estimate the effectiveness of a cybersecurity strategy. Cybersecurity Threats, Malware Trends, and Strategies acts as a comprehensive guide to cybersecurity based on thousands of cybersecurity discussions and threat intelligence briefings that the author has participated in over a two-decade career.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Cyberterrorism.
|
650 |
|
0 |
|a Malware (Computer software)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Cyberterrorisme.
|
650 |
|
6 |
|a Logiciels malveillants.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Cyberterrorism
|2 fast
|
650 |
|
7 |
|a Malware (Computer software)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Rains, Tim
|t Cybersecurity Threats, Malware Trends, and Strategies : Mitigate Exploits, Malware, Phishing, and Other Social Engineering Attacks
|d Birmingham : Packt Publishing, Limited,c2020
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781800206014/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301311501
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2490088
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37439547
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6215711
|
994 |
|
|
|a 92
|b IZTAP
|