語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advanced persistent securitya cyberw...
~
Gomes, Araceli Treu,
Advanced persistent securitya cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Advanced persistent securityIra Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor.
其他題名:
a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
作者:
Winkler, Ira,
其他作者:
Gomes, Araceli Treu,
出版者:
Cambridge, MA :Syngress,2017.
面頁冊數:
1 online resource.
附註:
Includes index.
標題:
Computer networksSecurity measures.
電子資源:
https://www.sciencedirect.com/science/book/9780128093160
ISBN:
9780128093658 (electronic bk.)
Advanced persistent securitya cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
Winkler, Ira,
Advanced persistent security
a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /[electronic resource] :Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor. - Cambridge, MA :Syngress,2017. - 1 online resource.
Includes index.
What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures --Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Knowyourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security.
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
ISBN: 9780128093658 (electronic bk.)Subjects--Topical Terms:
185597
Computer networks
--Security measures.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Advanced persistent securitya cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
LDR
:02326cmm a2200265 a 4500
001
601455
006
m o d
007
cr cnu---unuuu
008
211110s2017 maua go 001 0 eng d
020
$a
9780128093658 (electronic bk.)
020
$a
012809365X (electronic bk.)
020
$a
9780128093160
020
$a
0128093161
035
$a
(OCoLC)962064634
035
$a
ocn962064634
040
$a
IDEBK
$b
eng
$c
IDEBK
$d
EBLCP
$d
N
$d
UMI
$d
OCLCF
$d
STF
$d
DEBBG
$d
IDB
$d
OPELS
$d
UPM
$d
GGVRL
$d
MERER
$d
OCLCQ
$d
YDX
$d
OTZ
$d
OCLCQ
$d
MERUC
$d
OCLCA
$d
D6H
$d
U3W
$d
UOK
$d
CEF
$d
KSU
$d
OCLCQ
$d
S2H
$d
OCLCO
$d
VLY
$d
HS0
041
0
$a
eng
050
4
$a
TK5105.59
082
0 4
$a
005.8
$2
23
100
1
$a
Winkler, Ira,
$e
author.
$3
896534
245
1 0
$a
Advanced persistent security
$h
[electronic resource] :
$b
a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
$c
Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor.
260
$a
Cambridge, MA :
$b
Syngress,
$c
2017.
300
$a
1 online resource.
500
$a
Includes index.
505
0
$a
What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures --Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Knowyourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security.
520
$a
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Computer security.
$3
184416
650
0
$a
Hacking.
$3
756286
650
7
$a
COMPUTERS
$x
Security
$x
General.
$2
bisacsh
$3
536867
655
0
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Gomes, Araceli Treu,
$e
author.
$3
896535
700
1
$a
Shackleford, Dave,
$e
editor.
$3
896536
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128093160
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000200711
電子館藏
1圖書
電子書
EB TK5105.59 2017
一般使用(Normal)
編目處理中
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://www.sciencedirect.com/science/book/9780128093160
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入