Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Advanced Persistent Security
A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
Taschenbuch von Ira Winkler (u. a.)
Sprache: Englisch

43,30 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 4-7 Werktage

Produkt Anzahl: Gib den gewünschten Wert ein oder benutze die Schaltflächen um die Anzahl zu erhöhen oder zu reduzieren.
Kategorien:
Beschreibung

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.

The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.



  • Contains practical and cost-effective recommendations for proactive and reactive protective measures
  • Teaches users how to establish a viable threat intelligence program
  • Focuses on how social networks present a double-edged sword against security programs

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.

The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.



  • Contains practical and cost-effective recommendations for proactive and reactive protective measures
  • Teaches users how to establish a viable threat intelligence program
  • Focuses on how social networks present a double-edged sword against security programs
Inhaltsverzeichnis
1. What Is Advanced Persistent Security?

Section 1. Concepts/Foundation 2. Cyberwarfare Concepts 3. What Is Proaction? 4. Risk Management 5. How to Hack Computers 6. Threat 7. Adversary Infrastructure

Section 2. Protection 8. Governance 9. Vulnerabilities to Address 10. Countermeasures 11. Security Culture 12. What Is Threat Intelligence?

Section 3. Detection 13. What Is Detection? 14. Detection Deficit Disorder 15. The Human Intrusion Detection System 16. Kill Chain Analysis

Section 4. Reaction 17. Setting Reaction Strategy 18. Incident Response and Investigations

Section 5. Implementation 19. Know Yourself 20. Know Your Adversaries 21. Define Your Strategy 22. Determining the Appropriate Countermeasures 23. Advanced Persistent Security

Details
Erscheinungsjahr: 2016
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Kartoniert / Broschiert
ISBN-13: 9780128093160
ISBN-10: 0128093161
Sprache: Englisch
Herstellernummer: 61705934
Autor: Winkler, Ira
Treu Gomes, Araceli
Hersteller: Syngress
Verantwortliche Person für die EU: preigu, Ansas Meyer, Lengericher Landstr. 19, D-49078 Osnabrück, mail@preigu.de
Maße: 12 x 186 x 232 mm
Von/Mit: Ira Winkler (u. a.)
Erscheinungsdatum: 25.11.2016
Gewicht: 0,57 kg
Artikel-ID: 131572565
Inhaltsverzeichnis
1. What Is Advanced Persistent Security?

Section 1. Concepts/Foundation 2. Cyberwarfare Concepts 3. What Is Proaction? 4. Risk Management 5. How to Hack Computers 6. Threat 7. Adversary Infrastructure

Section 2. Protection 8. Governance 9. Vulnerabilities to Address 10. Countermeasures 11. Security Culture 12. What Is Threat Intelligence?

Section 3. Detection 13. What Is Detection? 14. Detection Deficit Disorder 15. The Human Intrusion Detection System 16. Kill Chain Analysis

Section 4. Reaction 17. Setting Reaction Strategy 18. Incident Response and Investigations

Section 5. Implementation 19. Know Yourself 20. Know Your Adversaries 21. Define Your Strategy 22. Determining the Appropriate Countermeasures 23. Advanced Persistent Security

Details
Erscheinungsjahr: 2016
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Kartoniert / Broschiert
ISBN-13: 9780128093160
ISBN-10: 0128093161
Sprache: Englisch
Herstellernummer: 61705934
Autor: Winkler, Ira
Treu Gomes, Araceli
Hersteller: Syngress
Verantwortliche Person für die EU: preigu, Ansas Meyer, Lengericher Landstr. 19, D-49078 Osnabrück, mail@preigu.de
Maße: 12 x 186 x 232 mm
Von/Mit: Ira Winkler (u. a.)
Erscheinungsdatum: 25.11.2016
Gewicht: 0,57 kg
Artikel-ID: 131572565
Sicherheitshinweis