Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies

Book Cover
Average Rating
Published
Cambridge, MA : Syngress, [2017].
Status
Available Online

Description

Loading Description...

More Details

Format
Language
English
ISBN
9780128093658, 012809365X

Notes

General Note
Includes index.
Description
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
Local note
O'Reilly,O'Reilly Online Learning: Academic/Public Library Edition

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Winkler, I., Gomes, A. T., & Shackleford, D. (2017). Advanced persistent security: a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies . Syngress.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Winkler, Ira, Araceli Treu, Gomes and Dave, Shackleford. 2017. Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies. Cambridge, MA: Syngress.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Winkler, Ira, Araceli Treu, Gomes and Dave, Shackleford. Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies Cambridge, MA: Syngress, 2017.

Harvard Citation (style guide)

Winkler, I., Gomes, A. T. and Shackleford, D. (2017). Advanced persistent security: a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies. Cambridge, MA: Syngress.

MLA Citation, 9th Edition (style guide)

Winkler, Ira,, Araceli Treu Gomes, and Dave Shackleford. Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies Syngress, 2017.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
2884579c-67af-74a0-707c-1d94dc489dd5-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work ID2884579c-67af-74a0-707c-1d94dc489dd5-eng
Full titleadvanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection detection and reaction strategies
Authorwinkler ira
Grouping Categorybook
Last Update2024-10-08 10:55:34AM
Last Indexed2024-12-03 03:06:30AM

Book Cover Information

Image SourcecontentCafe
First LoadedSep 22, 2024
Last UsedNov 1, 2024

Marc Record

First DetectedMar 14, 2023 07:56:19 AM
Last File Modification TimeMar 14, 2023 07:56:19 AM
SuppressedRecord had no items

MARC Record

LEADER03756cam a2200553 i 4500
001ocn962064634
003OCoLC
00520230314075543.0
006m     o  d        
007cr cnu---unuuu
008161102s2017    mau     o     001 0 eng d
019 |a 961910106|a 961931707|a 962419829|a 1162539862|a 1227642525
020 |a 9780128093658|q (electronic bk.)
020 |a 012809365X|q (electronic bk.)
035 |a (OCoLC)962064634|z (OCoLC)961910106|z (OCoLC)961931707|z (OCoLC)962419829|z (OCoLC)1162539862|z (OCoLC)1227642525
037 |a CL0500000800|b Safari Books Online
040 |a IDEBK|b eng|e rda|e pn|c IDEBK|d EBLCP|d N$T|d UMI|d OCLCF|d STF|d DEBBG|d IDB|d OPELS|d UPM|d GGVRL|d MERER|d OCLCQ|d YDX|d OTZ|d OCLCQ|d MERUC|d OCLCA|d D6H|d U3W|d UOK|d CEF|d KSU|d OCLCQ|d S2H|d OCLCO|d VLY|d HS0|d OCLCO|d OCLCQ
049 |a MAIN
050 4|a TK5105.59
072 7|a COM|x 053000|2 bisacsh
08204|a 005.8|2 23
1001 |a Winkler, Ira,|e author.|9 213262
24510|a Advanced persistent security :|b a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /|c Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor.
264 1|a Cambridge, MA :|b Syngress,|c [2017]
264 4|c ©2017
300 |a 1 online resource
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
500 |a Includes index.
5050 |a What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures -- Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Know yourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security.
520 |a Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
5880 |a Online resource; title from PDF title page (EBSCO, viewed December 1, 2016).
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Computer networks|x Security measures.|9 68848
650 0|a Computer security.|9 65527
650 0|a Hacking.|9 404059
650 2|a Computer Security|9 65527
7001 |a Gomes, Araceli Treu,|e author.
7001 |a Shackleford, Dave,|e editor.
77608|i Print version:|a Winkler, Ira.|t Advanced persistent security.|d ©2017|z 0128093161|z 9780128093160|w (OCoLC)956626559
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9780128093658/?ar|x O'Reilly|z eBook
938 |a EBL - Ebook Library|b EBLB|n EBL4730826
938 |a EBSCOhost|b EBSC|n 1145032
938 |a Gale Cengage Learning|b GVRL|n GVRL02VN
938 |a ProQuest MyiLibrary Digital eBook Collection|b IDEB|n cis36880368
938 |a YBP Library Services|b YANK|n 13239008
994 |a 92|b VIA
999 |c 281221|d 281221