Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
43,30 €*
Versandkostenfrei per Post / DHL
Lieferzeit 4-7 Werktage
Kategorien:
Beschreibung
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.
The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.
The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
Inhaltsverzeichnis
1. What Is Advanced Persistent Security? Section 1. Concepts/Foundation2. Cyberwarfare Concepts
3. What Is Proaction?
4. Risk Management
5. How to Hack Computers
6. Threat
7. Adversary Infrastructure Section 2. Protection8. Governance
9. Vulnerabilities to Address
10. Countermeasures
11. Security Culture
12. What Is Threat Intelligence? Section 3. Detection13. What Is Detection?
14. Detection Deficit Disorder
15. The Human Intrusion Detection System
16. Kill Chain Analysis Section 4. Reaction17. Setting Reaction Strategy
18. Incident Response and Investigations Section 5. Implementation19. Know Yourself
20. Know Your Adversaries
21. Define Your Strategy
22. Determining the Appropriate Countermeasures
23. Advanced Persistent Security
3. What Is Proaction?
4. Risk Management
5. How to Hack Computers
6. Threat
7. Adversary Infrastructure Section 2. Protection8. Governance
9. Vulnerabilities to Address
10. Countermeasures
11. Security Culture
12. What Is Threat Intelligence? Section 3. Detection13. What Is Detection?
14. Detection Deficit Disorder
15. The Human Intrusion Detection System
16. Kill Chain Analysis Section 4. Reaction17. Setting Reaction Strategy
18. Incident Response and Investigations Section 5. Implementation19. Know Yourself
20. Know Your Adversaries
21. Define Your Strategy
22. Determining the Appropriate Countermeasures
23. Advanced Persistent Security
Details
Erscheinungsjahr: | 2016 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | Kartoniert / Broschiert |
ISBN-13: | 9780128093160 |
ISBN-10: | 0128093161 |
Sprache: | Englisch |
Herstellernummer: | C2015-0-04099-0 |
Autor: |
Winkler, Ira
Treu Gomes, Araceli |
Hersteller: | Syngress |
Verantwortliche Person für die EU: | preigu, Ansas Meyer, Lengericher Landstr. 19, D-49078 Osnabrück, mail@preigu.de |
Maße: | 12 x 186 x 232 mm |
Von/Mit: | Ira Winkler (u. a.) |
Erscheinungsdatum: | 25.11.2016 |
Gewicht: | 0,57 kg |
Inhaltsverzeichnis
1. What Is Advanced Persistent Security? Section 1. Concepts/Foundation2. Cyberwarfare Concepts
3. What Is Proaction?
4. Risk Management
5. How to Hack Computers
6. Threat
7. Adversary Infrastructure Section 2. Protection8. Governance
9. Vulnerabilities to Address
10. Countermeasures
11. Security Culture
12. What Is Threat Intelligence? Section 3. Detection13. What Is Detection?
14. Detection Deficit Disorder
15. The Human Intrusion Detection System
16. Kill Chain Analysis Section 4. Reaction17. Setting Reaction Strategy
18. Incident Response and Investigations Section 5. Implementation19. Know Yourself
20. Know Your Adversaries
21. Define Your Strategy
22. Determining the Appropriate Countermeasures
23. Advanced Persistent Security
3. What Is Proaction?
4. Risk Management
5. How to Hack Computers
6. Threat
7. Adversary Infrastructure Section 2. Protection8. Governance
9. Vulnerabilities to Address
10. Countermeasures
11. Security Culture
12. What Is Threat Intelligence? Section 3. Detection13. What Is Detection?
14. Detection Deficit Disorder
15. The Human Intrusion Detection System
16. Kill Chain Analysis Section 4. Reaction17. Setting Reaction Strategy
18. Incident Response and Investigations Section 5. Implementation19. Know Yourself
20. Know Your Adversaries
21. Define Your Strategy
22. Determining the Appropriate Countermeasures
23. Advanced Persistent Security
Details
Erscheinungsjahr: | 2016 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | Kartoniert / Broschiert |
ISBN-13: | 9780128093160 |
ISBN-10: | 0128093161 |
Sprache: | Englisch |
Herstellernummer: | C2015-0-04099-0 |
Autor: |
Winkler, Ira
Treu Gomes, Araceli |
Hersteller: | Syngress |
Verantwortliche Person für die EU: | preigu, Ansas Meyer, Lengericher Landstr. 19, D-49078 Osnabrück, mail@preigu.de |
Maße: | 12 x 186 x 232 mm |
Von/Mit: | Ira Winkler (u. a.) |
Erscheinungsdatum: | 25.11.2016 |
Gewicht: | 0,57 kg |
Sicherheitshinweis