Advanced persistent threat: understanding the danger and how to protect your organization
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
2012
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. Advanced Persistent Threat covers what you need to know including: How and why organizations are being attacked . How to develop a "Risk based Approach to Security". Tools for protecting data and preventing attacks. Critical information on how to respond and recover from an intrusion. The emerging threat to Cloud based networks |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 9781597499491 1597499498 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305255 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781597499491 |9 978-1-59749-949-1 | ||
020 | |a 1597499498 |9 1-59749-949-8 | ||
035 | |a (OCoLC)819636702 | ||
035 | |a (DE-599)BVBBV042305255 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Cole, Eric |e Verfasser |4 aut | |
245 | 1 | 0 | |a Advanced persistent threat |b understanding the danger and how to protect your organization |c Eric Cole |
264 | 1 | |a Waltham, MA |b Syngress |c 2012 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. Advanced Persistent Threat covers what you need to know including: How and why organizations are being attacked . How to develop a "Risk based Approach to Security". Tools for protecting data and preventing attacks. Critical information on how to respond and recover from an intrusion. The emerging threat to Cloud based networks | ||
650 | 7 | |a Computer networks / Access control |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer networks |x Access control | |
650 | 4 | |a Internet |x Security measures | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597499491 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027742247 |
Datensatz im Suchindex
_version_ | 1804152888132370432 |
---|---|
any_adam_object | |
author | Cole, Eric |
author_facet | Cole, Eric |
author_role | aut |
author_sort | Cole, Eric |
author_variant | e c ec |
building | Verbundindex |
bvnumber | BV042305255 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)819636702 (DE-599)BVBBV042305255 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02572nmm a2200409zc 4500</leader><controlfield tag="001">BV042305255</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499491</subfield><subfield code="9">978-1-59749-949-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499498</subfield><subfield code="9">1-59749-949-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)819636702</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305255</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cole, Eric</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced persistent threat</subfield><subfield code="b">understanding the danger and how to protect your organization</subfield><subfield code="c">Eric Cole</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. Advanced Persistent Threat covers what you need to know including: How and why organizations are being attacked . How to develop a "Risk based Approach to Security". Tools for protecting data and preventing attacks. Critical information on how to respond and recover from an intrusion. The emerging threat to Cloud based networks</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597499491</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742247</subfield></datafield></record></collection> |
id | DE-604.BV042305255 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:52Z |
institution | BVB |
isbn | 9781597499491 1597499498 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742247 |
oclc_num | 819636702 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress |
record_format | marc |
spelling | Cole, Eric Verfasser aut Advanced persistent threat understanding the danger and how to protect your organization Eric Cole Waltham, MA Syngress 2012 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. Advanced Persistent Threat covers what you need to know including: How and why organizations are being attacked . How to develop a "Risk based Approach to Security". Tools for protecting data and preventing attacks. Critical information on how to respond and recover from an intrusion. The emerging threat to Cloud based networks Computer networks / Access control fast Computer networks / Security measures fast Internet / Security measures fast Computer networks Security measures Computer networks Access control Internet Security measures http://www.sciencedirect.com/science/book/9781597499491 Verlag Volltext |
spellingShingle | Cole, Eric Advanced persistent threat understanding the danger and how to protect your organization Computer networks / Access control fast Computer networks / Security measures fast Internet / Security measures fast Computer networks Security measures Computer networks Access control Internet Security measures |
title | Advanced persistent threat understanding the danger and how to protect your organization |
title_auth | Advanced persistent threat understanding the danger and how to protect your organization |
title_exact_search | Advanced persistent threat understanding the danger and how to protect your organization |
title_full | Advanced persistent threat understanding the danger and how to protect your organization Eric Cole |
title_fullStr | Advanced persistent threat understanding the danger and how to protect your organization Eric Cole |
title_full_unstemmed | Advanced persistent threat understanding the danger and how to protect your organization Eric Cole |
title_short | Advanced persistent threat |
title_sort | advanced persistent threat understanding the danger and how to protect your organization |
title_sub | understanding the danger and how to protect your organization |
topic | Computer networks / Access control fast Computer networks / Security measures fast Internet / Security measures fast Computer networks Security measures Computer networks Access control Internet Security measures |
topic_facet | Computer networks / Access control Computer networks / Security measures Internet / Security measures Computer networks Security measures Computer networks Access control Internet Security measures |
url | http://www.sciencedirect.com/science/book/9781597499491 |
work_keys_str_mv | AT coleeric advancedpersistentthreatunderstandingthedangerandhowtoprotectyourorganization |