Advanced persistent security: a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risk...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, MA
Syngress
[2017]
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face |
Beschreibung: | Includes index |
Beschreibung: | 1 online resource |
ISBN: | 9780128093658 012809365X |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045131668 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 180814s2017 |||| o||u| ||||||eng d | ||
020 | |a 9780128093658 |9 978-0-12-809365-8 | ||
020 | |a 012809365X |9 0-12-809365-X | ||
035 | |a (ZDB-33-ESD)ocn962064634 | ||
035 | |a (OCoLC)962064634 | ||
035 | |a (DE-599)BVBBV045131668 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Winkler, Ira |e Verfasser |4 aut | |
245 | 1 | 0 | |a Advanced persistent security |b a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies |c Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor |
264 | 1 | |a Cambridge, MA |b Syngress |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face | ||
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Hacking |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hacking | |
700 | 1 | |a Gomes, Araceli Treu |4 aut | |
700 | 1 | |a Shackleford, Dave |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128093160 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0128093161 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128093160 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030521661 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780128093160 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178791460765696 |
---|---|
any_adam_object | |
author | Winkler, Ira Gomes, Araceli Treu |
author2 | Shackleford, Dave |
author2_role | edt |
author2_variant | d s ds |
author_facet | Winkler, Ira Gomes, Araceli Treu Shackleford, Dave |
author_role | aut aut |
author_sort | Winkler, Ira |
author_variant | i w iw a t g at atg |
building | Verbundindex |
bvnumber | BV045131668 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-ESD)ocn962064634 (OCoLC)962064634 (DE-599)BVBBV045131668 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02455nmm a2200481zc 4500</leader><controlfield tag="001">BV045131668</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180814s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128093658</subfield><subfield code="9">978-0-12-809365-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">012809365X</subfield><subfield code="9">0-12-809365-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn962064634</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)962064634</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045131668</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Winkler, Ira</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced persistent security</subfield><subfield code="b">a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies</subfield><subfield code="c">Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hacking</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gomes, Araceli Treu</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shackleford, Dave</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128093160</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0128093161</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128093160</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030521661</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128093160</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045131668 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:09:35Z |
institution | BVB |
isbn | 9780128093658 012809365X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030521661 |
oclc_num | 962064634 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-EBS ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Syngress |
record_format | marc |
spelling | Winkler, Ira Verfasser aut Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor Cambridge, MA Syngress [2017] © 2017 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes index Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Hacking fast Computer networks Security measures Computer security Hacking Gomes, Araceli Treu aut Shackleford, Dave edt Erscheint auch als Druck-Ausgabe 9780128093160 Erscheint auch als Druck-Ausgabe 0128093161 http://www.sciencedirect.com/science/book/9780128093160 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Winkler, Ira Gomes, Araceli Treu Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Hacking fast Computer networks Security measures Computer security Hacking |
title | Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies |
title_auth | Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies |
title_exact_search | Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies |
title_full | Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor |
title_fullStr | Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor |
title_full_unstemmed | Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor |
title_short | Advanced persistent security |
title_sort | advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection detection and reaction strategies |
title_sub | a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies |
topic | COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Hacking fast Computer networks Security measures Computer security Hacking |
topic_facet | COMPUTERS / Security / General Computer networks / Security measures Computer security Hacking Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9780128093160 |
work_keys_str_mv | AT winklerira advancedpersistentsecurityacyberwarfareapproachtoimplementingadaptiveenterpriseprotectiondetectionandreactionstrategies AT gomesaracelitreu advancedpersistentsecurityacyberwarfareapproachtoimplementingadaptiveenterpriseprotectiondetectionandreactionstrategies AT shackleforddave advancedpersistentsecurityacyberwarfareapproachtoimplementingadaptiveenterpriseprotectiondetectionandreactionstrategies |