Cybercrime and espionage: an analysis of subversive multi-vector threats
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Syngress
2011
|
Schlagworte: | |
Online-Zugang: | FUBA1 Volltext |
Beschreibung: | Includes index Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights Present never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (XV, 254 S.) Ill. |
ISBN: | 9781597496148 1597496146 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042306944 | ||
003 | DE-604 | ||
005 | 20210819 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781597496148 |c electronic bk. |9 978-1-59749-614-8 | ||
020 | |a 1597496146 |c electronic bk. |9 1-59749-614-6 | ||
024 | 7 | |a 10.1016/C2010-0-64928-5 |2 doi | |
035 | |a (ZDB-33-EBS)ocn703272564 | ||
035 | |a (OCoLC)703272564 | ||
035 | |a (DE-599)BVBBV042306944 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-188 | ||
082 | 0 | |a 658.47 |2 22 | |
100 | 1 | |a Gragido, Will |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cybercrime and espionage |b an analysis of subversive multi-vector threats |c by Will Gragido, John Pirc |
264 | 1 | |a Amsterdam [u.a.] |b Syngress |c 2011 | |
300 | |a 1 Online-Ressource (XV, 254 S.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights Present never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a BUSINESS & ECONOMICS / Workplace Culture |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Leadership |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Governance |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Development |2 bisacsh | |
650 | 7 | |a Computer crimes |2 local | |
650 | 7 | |a Espionage |2 local | |
650 | 7 | |a Security systems |2 local | |
650 | 7 | |a Computer crimes / Prevention |2 local | |
650 | 7 | |a Business intelligence |2 local | |
650 | 7 | |a Threats / Safety measures |2 local | |
650 | 4 | |a Führung | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Security systems | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Business intelligence | |
650 | 4 | |a Espionage | |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ausspähen von Daten |0 (DE-588)7714184-2 |2 gnd |9 rswk-swf |
653 | |a Electronic books | ||
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Ausspähen von Daten |0 (DE-588)7714184-2 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Pirc, John |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-59749-613-1 |w (DE-604)BV036754310 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-59749-613-8 |w (DE-604)BV036754310 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597496131 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027743936 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597496131 |l FUBA1 |p ZDB-33-ESD |q ZDB-33-ESD 2012 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152891713257472 |
---|---|
any_adam_object | |
author | Gragido, Will Pirc, John |
author_facet | Gragido, Will Pirc, John |
author_role | aut aut |
author_sort | Gragido, Will |
author_variant | w g wg j p jp |
building | Verbundindex |
bvnumber | BV042306944 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn703272564 (OCoLC)703272564 (DE-599)BVBBV042306944 |
dewey-full | 658.47 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.47 |
dewey-search | 658.47 |
dewey-sort | 3658.47 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04068nmm a2200733zc 4500</leader><controlfield tag="001">BV042306944</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210819 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496148</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-614-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496146</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-614-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/C2010-0-64928-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn703272564</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)703272564</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042306944</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.47</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gragido, Will</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybercrime and espionage</subfield><subfield code="b">an analysis of subversive multi-vector threats</subfield><subfield code="c">by Will Gragido, John Pirc</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Syngress</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XV, 254 S.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights Present never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Workplace Culture</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Leadership</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Governance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Development</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Espionage</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Security systems</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business intelligence</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Threats / Safety measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Führung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Espionage</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ausspähen von Daten</subfield><subfield code="0">(DE-588)7714184-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Ausspähen von Daten</subfield><subfield code="0">(DE-588)7714184-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pirc, John</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-59749-613-1</subfield><subfield code="w">(DE-604)BV036754310</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-59749-613-8</subfield><subfield code="w">(DE-604)BV036754310</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597496131</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027743936</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597496131</subfield><subfield code="l">FUBA1</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">ZDB-33-ESD 2012</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042306944 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:17:55Z |
institution | BVB |
isbn | 9781597496148 1597496146 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027743936 |
oclc_num | 703272564 |
open_access_boolean | |
owner | DE-1046 DE-188 |
owner_facet | DE-1046 DE-188 |
physical | 1 Online-Ressource (XV, 254 S.) Ill. |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD ZDB-33-ESD ZDB-33-ESD 2012 |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Syngress |
record_format | marc |
spelling | Gragido, Will Verfasser aut Cybercrime and espionage an analysis of subversive multi-vector threats by Will Gragido, John Pirc Amsterdam [u.a.] Syngress 2011 1 Online-Ressource (XV, 254 S.) Ill. txt rdacontent c rdamedia cr rdacarrier Includes index Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights Present never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them Includes bibliographical references and index BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Computer crimes local Espionage local Security systems local Computer crimes / Prevention local Business intelligence local Threats / Safety measures local Führung Wirtschaft Security systems Computer crimes Business intelligence Espionage Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Ausspähen von Daten (DE-588)7714184-2 gnd rswk-swf Electronic books Internetkriminalität (DE-588)7864395-8 s Ausspähen von Daten (DE-588)7714184-2 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Pirc, John Verfasser aut Erscheint auch als Druck-Ausgabe 978-1-59749-613-1 (DE-604)BV036754310 Erscheint auch als Druck-Ausgabe 1-59749-613-8 (DE-604)BV036754310 http://www.sciencedirect.com/science/book/9781597496131 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Gragido, Will Pirc, John Cybercrime and espionage an analysis of subversive multi-vector threats BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Computer crimes local Espionage local Security systems local Computer crimes / Prevention local Business intelligence local Threats / Safety measures local Führung Wirtschaft Security systems Computer crimes Business intelligence Espionage Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd Ausspähen von Daten (DE-588)7714184-2 gnd |
subject_GND | (DE-588)7864395-8 (DE-588)4274324-2 (DE-588)7714184-2 |
title | Cybercrime and espionage an analysis of subversive multi-vector threats |
title_auth | Cybercrime and espionage an analysis of subversive multi-vector threats |
title_exact_search | Cybercrime and espionage an analysis of subversive multi-vector threats |
title_full | Cybercrime and espionage an analysis of subversive multi-vector threats by Will Gragido, John Pirc |
title_fullStr | Cybercrime and espionage an analysis of subversive multi-vector threats by Will Gragido, John Pirc |
title_full_unstemmed | Cybercrime and espionage an analysis of subversive multi-vector threats by Will Gragido, John Pirc |
title_short | Cybercrime and espionage |
title_sort | cybercrime and espionage an analysis of subversive multi vector threats |
title_sub | an analysis of subversive multi-vector threats |
topic | BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Computer crimes local Espionage local Security systems local Computer crimes / Prevention local Business intelligence local Threats / Safety measures local Führung Wirtschaft Security systems Computer crimes Business intelligence Espionage Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd Ausspähen von Daten (DE-588)7714184-2 gnd |
topic_facet | BUSINESS & ECONOMICS / Workplace Culture BUSINESS & ECONOMICS / Leadership BUSINESS & ECONOMICS / Corporate Governance BUSINESS & ECONOMICS / Organizational Development Computer crimes Espionage Security systems Computer crimes / Prevention Business intelligence Threats / Safety measures Führung Wirtschaft Internetkriminalität Computersicherheit Ausspähen von Daten |
url | http://www.sciencedirect.com/science/book/9781597496131 |
work_keys_str_mv | AT gragidowill cybercrimeandespionageananalysisofsubversivemultivectorthreats AT pircjohn cybercrimeandespionageananalysisofsubversivemultivectorthreats |