Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
Description
More Details
Notes
Subjects
Also in this Series
Reviews from GoodReads
Citations
Winkler, I., Gomes, A. T., & Shackleford, D. (2017). Advanced persistent security: a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies . Syngress.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Winkler, Ira, Araceli Treu, Gomes and Dave, Shackleford. 2017. Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies. Cambridge, MA: Syngress.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Winkler, Ira, Araceli Treu, Gomes and Dave, Shackleford. Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies Cambridge, MA: Syngress, 2017.
Harvard Citation (style guide)Winkler, I., Gomes, A. T. and Shackleford, D. (2017). Advanced persistent security: a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies. Cambridge, MA: Syngress.
MLA Citation, 9th Edition (style guide)Winkler, Ira,, Araceli Treu Gomes, and Dave Shackleford. Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies Syngress, 2017.
Staff View
Grouping Information
Grouped Work ID | 2884579c-67af-74a0-707c-1d94dc489dd5-eng |
---|---|
Full title | advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection detection and reaction strategies |
Author | winkler ira |
Grouping Category | book |
Last Update | 2024-10-08 10:55:34AM |
Last Indexed | 2024-12-03 03:06:30AM |
Book Cover Information
Image Source | contentCafe |
---|---|
First Loaded | Sep 22, 2024 |
Last Used | Nov 1, 2024 |
Marc Record
First Detected | Mar 14, 2023 07:56:19 AM |
---|---|
Last File Modification Time | Mar 14, 2023 07:56:19 AM |
Suppressed | Record had no items |
MARC Record
LEADER | 03756cam a2200553 i 4500 | ||
---|---|---|---|
001 | ocn962064634 | ||
003 | OCoLC | ||
005 | 20230314075543.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 161102s2017 mau o 001 0 eng d | ||
019 | |a 961910106|a 961931707|a 962419829|a 1162539862|a 1227642525 | ||
020 | |a 9780128093658|q (electronic bk.) | ||
020 | |a 012809365X|q (electronic bk.) | ||
035 | |a (OCoLC)962064634|z (OCoLC)961910106|z (OCoLC)961931707|z (OCoLC)962419829|z (OCoLC)1162539862|z (OCoLC)1227642525 | ||
037 | |a CL0500000800|b Safari Books Online | ||
040 | |a IDEBK|b eng|e rda|e pn|c IDEBK|d EBLCP|d N$T|d UMI|d OCLCF|d STF|d DEBBG|d IDB|d OPELS|d UPM|d GGVRL|d MERER|d OCLCQ|d YDX|d OTZ|d OCLCQ|d MERUC|d OCLCA|d D6H|d U3W|d UOK|d CEF|d KSU|d OCLCQ|d S2H|d OCLCO|d VLY|d HS0|d OCLCO|d OCLCQ | ||
049 | |a MAIN | ||
050 | 4 | |a TK5105.59 | |
072 | 7 | |a COM|x 053000|2 bisacsh | |
082 | 0 | 4 | |a 005.8|2 23 |
100 | 1 | |a Winkler, Ira,|e author.|9 213262 | |
245 | 1 | 0 | |a Advanced persistent security :|b a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /|c Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor. |
264 | 1 | |a Cambridge, MA :|b Syngress,|c [2017] | |
264 | 4 | |c ©2017 | |
300 | |a 1 online resource | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
500 | |a Includes index. | ||
505 | 0 | |a What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures -- Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Know yourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security. | |
520 | |a Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face. | ||
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed December 1, 2016). | |
590 | |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer networks|x Security measures.|9 68848 | |
650 | 0 | |a Computer security.|9 65527 | |
650 | 0 | |a Hacking.|9 404059 | |
650 | 2 | |a Computer Security|9 65527 | |
700 | 1 | |a Gomes, Araceli Treu,|e author. | |
700 | 1 | |a Shackleford, Dave,|e editor. | |
776 | 0 | 8 | |i Print version:|a Winkler, Ira.|t Advanced persistent security.|d ©2017|z 0128093161|z 9780128093160|w (OCoLC)956626559 |
856 | 4 | 0 | |u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9780128093658/?ar|x O'Reilly|z eBook |
938 | |a EBL - Ebook Library|b EBLB|n EBL4730826 | ||
938 | |a EBSCOhost|b EBSC|n 1145032 | ||
938 | |a Gale Cengage Learning|b GVRL|n GVRL02VN | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection|b IDEB|n cis36880368 | ||
938 | |a YBP Library Services|b YANK|n 13239008 | ||
994 | |a 92|b VIA | ||
999 | |c 281221|d 281221 |