Cantitate/Preț
Produs

Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

Autor Ira Winkler, Araceli Treu Gomes
en Limba Engleză Paperback – 25 noi 2016
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.
The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.


  • Contains practical and cost-effective recommendations for proactive and reactive protective measures
  • Teaches users how to establish a viable threat intelligence program
  • Focuses on how social networks present a double-edged sword against security programs
Citește tot Restrânge

Preț: 20735 lei

Preț vechi: 29270 lei
-29% Nou

Puncte Express: 311

Preț estimativ în valută:
3968 4093$ 3311£

Carte tipărită la comandă

Livrare economică 19 martie-02 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780128093160
ISBN-10: 0128093161
Pagini: 260
Dimensiuni: 191 x 235 x 17 mm
Greutate: 0.57 kg
Editura: ELSEVIER SCIENCE

Cuprins

1. What Is Advanced Persistent Security?
Section 1. Concepts/Foundation
2. Cyberwarfare Concepts
3. What Is Proaction?
4. Risk Management
5. How to Hack Computers
6. Threat
7. Adversary Infrastructure
Section 2. Protection
8. Governance
9. Vulnerabilities to Address
10. Countermeasures
11. Security Culture
12. What Is Threat Intelligence?
Section 3. Detection
13. What Is Detection?
14. Detection Deficit Disorder
15. The Human Intrusion Detection System
16. Kill Chain Analysis
Section 4. Reaction
17. Setting Reaction Strategy
18. Incident Response and Investigations
Section 5. Implementation
19. Know Yourself
20. Know Your Adversaries
21. Define Your Strategy
22. Determining the Appropriate Countermeasures
23. Advanced Persistent Security

Recenzii

"...this book couldn’t be more topical…it provides those who are tasked to implement an organization’s security strategy with an easy-to-follow plan of action to cover – and keep covering – all their bases." --Help Net Security
"The authors propose methods for more adaptive and comprehensive approaches to information security…For those looking for a methodology to create a more robust information security program, Advanced Persistent Security is a valuable resource." --RSAConference.com