본문

서브메뉴

상세정보

Cybercrime and espionage : an analysis of subversive multivector threats
Cybercrime and espionage : an analysis of subversive multivector threats / [by] Will Gragi...
Cybercrime and espionage : an analysis of subversive multivector threats

상세정보

자료유형  
 단행본(국외)
미국국회도서관 청구기호  
HV6773-.G724 2011
자관 청구기호  
364.168 G737c
    기본표목-개인명  
    표제와 책임표시사항  
    Cybercrime and espionage : an analysis of subversive multivector threats / [by] Will Gragido, John Pirc ; Russ Rogers, technical editor.
    발행, 배포, 간사 사항  
    Rockland, Mass. : Syngress , c2011.
      형태사항  
      xv, 254 p : ill. ; 24 cm.
      서지 등 주기  
      Includes bibliographical references and index.
      내용주기  
      완전내용Cybercrime and espionage and the new security 101 -- Evolution revolution -- The silent killer : how regulatory compliance has worsened the state of information security -- Mediating the great divorce : the convergence of physical and logical security -- Nonstate sponsored attacks : stealing information is our business, and business is good -- State-sponsored intelligence -- Cyber X : criminal syndicates, nation states, subnational entities, and beyond -- The rise of the subversive multivector threats -- Seven commonalities of subversive multivector threats -- Examples of compromise and presence of subversive multivector threats -- Hiding in plain sight : next-generation techniques and tools for avoidance and obfuscation -- Weapons of our warfare : next-generation techniques and tools for detection, identification, and analysis.
      요약 등 주기  
      요약Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information. Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights. Presents never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them.
      주제명부출표목-일반주제명  
      주제명부출표목-일반주제명  
      주제명부출표목-일반주제명  
      주제명부출표목-일반주제명  
      주제명부출표목-일반주제명  
      주제명부출표목-일반주제명  
      부출표목-개인명  
      부출표목-개인명  

      MARC

       008120208s2011        maua                    001  0  eng  d
      ■001MOKWON00733939
      ■00520120208140702
      ■008120208s2011        maua                    001  0  eng  d
      ■010    ▼a2011281246
      ■015    ▼aGBB0B1061
      ■020    ▼a9781597496131  (pbk.)▼c$59.95
      ■020    ▼a1597496138  (pbk.)
      ■035    ▼a(KERIS)BIB000012538788
      ■040    ▼a211006▼c211006▼d211006▼d225006
      ■05000▼aHV6773▼b.G724  2011
      ■08204▼a364.168▼222
      ■090    ▼a364.168▼bG737c
      ■1001  ▼aGragido,  Will
      ■24510▼aCybercrime  and  espionage▼ban  analysis  of  subversive  multivector  threats▼c[by]  Will  Gragido,  John  Pirc  ;  Russ  Rogers,  technical  editor.
      ■260    ▼aRockland,  Mass.▼bSyngress▼aOxford▼bElsevier  Science  [distributor]▼cc2011.
      ■300    ▼axv,  254  p▼bill.▼c24  cm.
      ■504    ▼aIncludes  bibliographical  references  and  index.
      ■5050  ▼aCybercrime  and  espionage  and  the  new  security  101  --  Evolution  revolution  --  The  silent  killer  :  how  regulatory  compliance  has  worsened  the  state  of  information  security  --  Mediating  the  great  divorce  :  the  convergence  of  physical  and  logical  security  --  Nonstate  sponsored  attacks  :  stealing  information  is  our  business,  and  business  is  good  --  State-sponsored  intelligence  --  Cyber  X  :  criminal  syndicates,  nation  states,  subnational  entities,  and  beyond  --  The  rise  of  the  subversive  multivector  threats  --  Seven  commonalities  of  subversive  multivector  threats  --  Examples  of  compromise  and  presence  of  subversive  multivector  threats  --  Hiding  in  plain  sight  :  next-generation  techniques  and  tools  for  avoidance  and  obfuscation  --  Weapons  of  our  warfare  :  next-generation  techniques  and  tools  for  detection,  identification,  and  analysis.
      ■520    ▼aCybercrime  and  Espionage  provides  a  wealth  of  knowledge  related  to  the  realities  seen  in  the  execution  of  advanced  attacks,  their  success  from  the  perspective  of  exploitation  and  their  presence  within  all  industry.  This  book  will  educate  you  on  realities  of  advanced,  next  generation  threats,  which  take  form  in  a  variety  ways.  The  authors,  working  in  conjunction  with  strategic  technology  partners  have  key  insights  into  the  realm  of  what  these  new  threats,  dubbed  "Subversive  Multi-Vector  Threats"  or  'SMT's.  Whether  the  goal  is  to  acquire  and  subsequently  sell  intellectual  property  from  one  organization  to  a  competitor  or  the  international  black  markets,  to  compromise  financial  data  and  systems,  or  undermine  the  security  posture  of  a  nation  state  by  another  nation  state  or  sub-national  entity,  these  threats  are  real  and  growing  at  an  alarming  pace.  Includes  detailed  analysis  and  examples  of  the  threats  in  addition  to  related  anecdotal  information.  Author's  combined  backgrounds  of  security,  military,  and  intelligence,  give  you  distinct  and  timely  insights.  Presents  never  before  published  information:  identification  and  analysis  of  cybercrime  and  the  psychological  profiles  that  accompany  them.
      ■650  0▼aComputer  crimes.
      ■650  0▼aEspionage.
      ■650  0▼aSecurity  systems.
      ■650  0▼aComputer  crimes▼xPrevention.
      ■650  0▼aBusiness  intelligence.
      ■650  0▼aThreats▼xSafety  measures.
      ■7001  ▼aPirc,  John.
      ■7001  ▼aRogers,  Russ.

      미리보기

      내보내기

      chatGPT토론

      Ai 추천 관련 도서


        신착도서 더보기
        관련도서 더보기
        최근 3년간 통계입니다.
        SMS 발송 간략정보 이동 상세정보출력

        소장정보

        • 예약
        • 서가에 없는 책 신고
        • 자료배달서비스
        • 나의폴더
        • 우선정리요청
        소장자료
        등록번호 청구기호 소장처 대출가능여부 대출정보
        MO454708 364.168 G737c 자료대출실(3층) 대출가능 대출가능
        마이폴더 부재도서신고

        * 대출중인 자료에 한하여 예약이 가능합니다. 예약을 원하시면 예약버튼을 클릭하십시오.

        해당 도서를 다른 이용자가 함께 대출한 도서

        관련도서

        관련 인기도서

        서평쓰기

        도서위치