Cargando…

Cybercrime and espionage : an analysis of subversive multi-vector threats /

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gragido, Will
Otros Autores: Pirc, John
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor], 2011.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn703272564
003 OCoLC
005 20231117044556.0
006 m o d
007 cr cnu---unuuu
008 110222s2011 maua ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d TWT  |d OPELS  |d E7B  |d OCLCQ  |d TEF  |d OCLCQ  |d UMI  |d DEBSZ  |d DKDLA  |d MERUC  |d EBLCP  |d YDXCP  |d AU@  |d OCLCF  |d TEFOD  |d VLB  |d TEFOD  |d OCLCQ  |d OCL  |d OCLCQ  |d LIV  |d OCLCQ  |d UAB  |d U3W  |d D6H  |d OCLCQ  |d CEF  |d COO  |d OCLCQ  |d WYU  |d LEAUB  |d UKAHL  |d OCLCQ  |d LUN  |d BRF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB0B1061  |2 bnb 
016 7 |a 015649812  |2 Uk 
019 |a 700706117  |a 706803070  |a 721510305  |a 759840988  |a 852502076  |a 1066043847 
020 |a 9781597496131  |q (electronic bk.) 
020 |a 1597496138  |q (electronic bk.) 
020 |a 9781597496148  |q (electronic bk.) 
020 |a 1597496146  |q (electronic bk.) 
024 8 |a 3605002 
035 |a (OCoLC)703272564  |z (OCoLC)700706117  |z (OCoLC)706803070  |z (OCoLC)721510305  |z (OCoLC)759840988  |z (OCoLC)852502076  |z (OCoLC)1066043847 
050 4 |a HV8290  |b .G73 2011eb 
072 7 |a BUS  |x 097000  |2 bisacsh 
072 7 |a BUS  |x 071000  |2 bisacsh 
072 7 |a BUS  |x 104000  |2 bisacsh 
072 7 |a BUS  |x 103000  |2 bisacsh 
082 0 4 |a 658.47  |2 22 
084 |a 54.89  |2 bcl 
100 1 |a Gragido, Will. 
245 1 0 |a Cybercrime and espionage :  |b an analysis of subversive multi-vector threats /  |c by Will Gragido, John Pirc. 
260 |a Rockland, Mass. :  |b Syngress ;  |a Oxford :  |b Elsevier Science [distributor],  |c 2011. 
300 |a 1 online resource (xv, 254 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cybercrime and espionage and the new security 101 -- Evolution revolution -- The silent killer : how regulatory compliance has worsened the state of information security -- Mediating the great divorce : the convergence of physical and logical security -- Nonstate sponsored attacks : stealing information is our business, and business is good -- State-sponsored intelligence -- Cyber X : criminal syndicates, nation states, subnational entities, and beyond -- The rise of the subversive multivector threats -- Seven commonalities of subversive multivector threats -- Examples of compromise and presence of subversive multivector threats -- Hiding in plain sight : next-generation techniques and tools for avoidance and obfuscation -- Weapons of our warfare : next-generation techniques and tools for detection, identification, and analysis. 
520 |a Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights Present never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
650 0 |a Security systems. 
650 0 |a Computer crimes. 
650 0 |a Business intelligence. 
650 0 |a Espionage. 
650 6 |a Syst�emes de s�ecurit�e.  |0 (CaQQLa)201-0001035 
650 6 |a Criminalit�e informatique.  |0 (CaQQLa)201-0056438 
650 6 |a Espionnage.  |0 (CaQQLa)201-0041556 
650 7 |a security systems.  |2 aat  |0 (CStmoGRI)aat300076660 
650 7 |a BUSINESS & ECONOMICS  |x Workplace Culture.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Leadership.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Corporate Governance.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Development.  |2 bisacsh 
650 7 |a Business intelligence  |2 fast  |0 (OCoLC)fst00842723 
650 7 |a Computer crimes  |2 fast  |0 (OCoLC)fst00872063 
650 7 |a Espionage  |2 fast  |0 (OCoLC)fst00915379 
650 7 |a Security systems  |2 fast  |0 (OCoLC)fst01110883 
700 1 |a Pirc, John. 
776 0 8 |i Print version:  |a Gragido, Will.  |t Cybercrime and espionage.  |d Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2011  |z 9781597496131  |w (OCoLC)657600279 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597496131  |z Texto completo