Cantitate/Preț
Produs

Cyber Security Essentials

Editat de James Graham
en Limba Engleză Hardback – 27 iul 2017
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign‘s iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book:Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threatsBreaks down the code used to write exploits into understandable diagramsThis book is not about the latest attack trends or botnets. It‘s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 50594 lei  6-8 săpt.
  CRC Press – 15 dec 2010 50594 lei  6-8 săpt.
Hardback (1) 104367 lei  3-5 săpt. +2588 lei  6-12 zile
  CRC Press – 27 iul 2017 104367 lei  3-5 săpt. +2588 lei  6-12 zile

Preț: 104367 lei

Preț vechi: 130458 lei
-20% Nou

Puncte Express: 1566

Preț estimativ în valută:
19974 20676$ 16882£

Carte disponibilă

Livrare economică 13-27 februarie
Livrare express 29 ianuarie-04 februarie pentru 3587 lei

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781138440401
ISBN-10: 113844040X
Pagini: 344
Dimensiuni: 156 x 234 x 27 mm
Greutate: 0.66 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications

Public țintă

Professional Practice & Development

Notă biografică

This book is the direct result of the outstanding efforts of a talented pool of security analysts, editors, business leaders and security professionals, all of whom work for iDefense Security Intelligence Services; a business unit of VeriSign, Inc. iDefense is an open-source, cyber security intelligence operation that maintains expertise in vulnerability research and alerting, exploit development, malicious code analysis, underground monitoring and international actor attribution. iDefense provides intelligence products to Fortune 1,000 companies and three-letter agencies in various world governments. iDefense also maintains the Security Operations Center for the Financial Sector Information Sharing and Analysis Center (FS-ISAC); one of 17 ISACs mandated by the US government to facilitate information sharing throughout the country's business sectors. iDefense has the industry-unique capability of determining not only the technical details of cyber security threats and events (the what, the when and the where), but because of their international presence, iDefense personnel can ascertain the most likely actors and motivations behind these attacks (the who and the why). For more information, please contact customerservice@idefense.com.

Cuprins

Cyber Security Fundamentals. Network and Security Concepts. Microsoft Windows Security Principles. Attacker Techniques and Motivations. How Hackers Cover Their Tracks (Anti-forensics). Fraud Techniques. Threat Infrastructure. Exploitation. Techniques to Gain a Foothold. Misdirection, Reconnaissance and Disruption Methods. Malicious Code. Self-Replicating Malicious Code. Evading Detection and Elevating Privileges. Stealing Information and Exploitation. Defense and Analysis Techniques. Memory Forensics. Honeypots. Malicious Code Naming. Automated Malicious Code Analysis Systems. Intrusion Detection Systems. iDefense Special File Investigation Tools.

Descriere

A collection of intelligence and security articles that covers common security terms and vulnerabilities, such as Stack Based Buffer Overflows, Malware_Naming, Fast-Flux, SQL Injection, and Format_String_ Vulnerability.