Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
Autor Ira Winkler, Araceli Treu Gomesen Limba Engleză Paperback – 24 noi 2016
The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
- Contains practical and cost-effective recommendations for proactive and reactive protective measures
- Teaches users how to establish a viable threat intelligence program
- Focuses on how social networks present a double-edged sword against security programs
Preț: 333.89 lei
Preț vechi: 417.36 lei
-20% Nou
Puncte Express: 501
Preț estimativ în valută:
63.89€ • 67.22$ • 52.90£
63.89€ • 67.22$ • 52.90£
Carte tipărită la comandă
Livrare economică 14-28 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780128093160
ISBN-10: 0128093161
Pagini: 260
Dimensiuni: 191 x 235 x 17 mm
Greutate: 0.57 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0128093161
Pagini: 260
Dimensiuni: 191 x 235 x 17 mm
Greutate: 0.57 kg
Editura: ELSEVIER SCIENCE
Cuprins
1. What Is Advanced Persistent Security?
Section 1. Concepts/Foundation 2. Cyberwarfare Concepts 3. What Is Proaction? 4. Risk Management 5. How to Hack Computers 6. Threat 7. Adversary Infrastructure
Section 2. Protection 8. Governance 9. Vulnerabilities to Address 10. Countermeasures 11. Security Culture 12. What Is Threat Intelligence?
Section 3. Detection 13. What Is Detection? 14. Detection Deficit Disorder 15. The Human Intrusion Detection System 16. Kill Chain Analysis
Section 4. Reaction 17. Setting Reaction Strategy 18. Incident Response and Investigations
Section 5. Implementation 19. Know Yourself 20. Know Your Adversaries 21. Define Your Strategy 22. Determining the Appropriate Countermeasures 23. Advanced Persistent Security
Section 1. Concepts/Foundation 2. Cyberwarfare Concepts 3. What Is Proaction? 4. Risk Management 5. How to Hack Computers 6. Threat 7. Adversary Infrastructure
Section 2. Protection 8. Governance 9. Vulnerabilities to Address 10. Countermeasures 11. Security Culture 12. What Is Threat Intelligence?
Section 3. Detection 13. What Is Detection? 14. Detection Deficit Disorder 15. The Human Intrusion Detection System 16. Kill Chain Analysis
Section 4. Reaction 17. Setting Reaction Strategy 18. Incident Response and Investigations
Section 5. Implementation 19. Know Yourself 20. Know Your Adversaries 21. Define Your Strategy 22. Determining the Appropriate Countermeasures 23. Advanced Persistent Security
Recenzii
"...this book couldn’t be more topical…it provides those who are tasked to implement an organization’s security strategy with an easy-to-follow plan of action to cover – and keep covering – all their bases." --Help Net Security
"The authors propose methods for more adaptive and comprehensive approaches to information security…For those looking for a methodology to create a more robust information security program, Advanced Persistent Security is a valuable resource." --RSAConference.com
"The authors propose methods for more adaptive and comprehensive approaches to information security…For those looking for a methodology to create a more robust information security program, Advanced Persistent Security is a valuable resource." --RSAConference.com