Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Targeted Cyber Attacks
Multi-Staged Attacks Driven by Exploits and Malware
Taschenbuch von Aditya Sood (u. a.)
Sprache: Englisch

30,50 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Aktuell nicht verfügbar

Kategorien:
Beschreibung
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile.

Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile.

Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.
Über den Autor
Aditya K Sood (Ph.D) is a Lead Architect for Cloud Threat Labs at Elastica. Dr. Sood has research interests in malware automation and analysis, application security, secure software design and cybercrime. He has worked on a number of projects pertaining to penetration testing specializing in product/appliance security, networks, mobile and web applications while serving Fortune 500 clients for IOActive, KPMG and others. He has authored several papers for various magazines and journals including IEEE, Elsevier, CrossTalk, ISACA, Virus Bulletin, Usenix and others. His work has been featured in several media outlets including Associated Press, Fox News, The Register, Guardian, Business Insider, Kaspersky Threatpost, CBC and others. He has been an active speaker at industry conferences and presented at BlackHat, DEFCON, HackInTheBox, RSA, Virus Bulletin, OWASP and many others. Dr. Sood obtained his Phd from Michigan State University in Computer Sciences. Dr. Sood is also an author of "Targeted Cyber Attacks" book published by Syngress.

Company Website: [...]

Personal Website: [...]

Inhaltsverzeichnis

1. Introduction 2. Intelligence Gathering 3. Infecting the Target 4. System Exploitation 5. Data Exfiltration Mechanisms 6. Maintaining Control and Lateral Movement 7. Why are Targeted Cyber Attacks Easy to Conduct? 8. Challenges and Countermeasures 9. Conclusion

Details
Erscheinungsjahr: 2014
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
ISBN-13: 9780128006047
ISBN-10: 0128006048
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Sood, Aditya
Enbody, Richard
Hersteller: Elsevier Science
Maße: 226 x 148 x 11 mm
Von/Mit: Aditya Sood (u. a.)
Erscheinungsdatum: 21.04.2014
Gewicht: 0,23 kg
Artikel-ID: 121015050
Über den Autor
Aditya K Sood (Ph.D) is a Lead Architect for Cloud Threat Labs at Elastica. Dr. Sood has research interests in malware automation and analysis, application security, secure software design and cybercrime. He has worked on a number of projects pertaining to penetration testing specializing in product/appliance security, networks, mobile and web applications while serving Fortune 500 clients for IOActive, KPMG and others. He has authored several papers for various magazines and journals including IEEE, Elsevier, CrossTalk, ISACA, Virus Bulletin, Usenix and others. His work has been featured in several media outlets including Associated Press, Fox News, The Register, Guardian, Business Insider, Kaspersky Threatpost, CBC and others. He has been an active speaker at industry conferences and presented at BlackHat, DEFCON, HackInTheBox, RSA, Virus Bulletin, OWASP and many others. Dr. Sood obtained his Phd from Michigan State University in Computer Sciences. Dr. Sood is also an author of "Targeted Cyber Attacks" book published by Syngress.

Company Website: [...]

Personal Website: [...]

Inhaltsverzeichnis

1. Introduction 2. Intelligence Gathering 3. Infecting the Target 4. System Exploitation 5. Data Exfiltration Mechanisms 6. Maintaining Control and Lateral Movement 7. Why are Targeted Cyber Attacks Easy to Conduct? 8. Challenges and Countermeasures 9. Conclusion

Details
Erscheinungsjahr: 2014
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
ISBN-13: 9780128006047
ISBN-10: 0128006048
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Sood, Aditya
Enbody, Richard
Hersteller: Elsevier Science
Maße: 226 x 148 x 11 mm
Von/Mit: Aditya Sood (u. a.)
Erscheinungsdatum: 21.04.2014
Gewicht: 0,23 kg
Artikel-ID: 121015050
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte