서브메뉴
검색
상세정보
Cybercrime and espionage : an analysis of subversive multivector threats
Cybercrime and espionage : an analysis of subversive multivector threats
상세정보
- 자료유형
- 단행본(국외)
- 미국국회도서관 청구기호
- HV6773-.G724 2011
- 자관 청구기호
- 기본표목-개인명
- 표제와 책임표시사항
- Cybercrime and espionage : an analysis of subversive multivector threats / [by] Will Gragido, John Pirc ; Russ Rogers, technical editor.
- 발행, 배포, 간사 사항
- 형태사항
- xv, 254 p : ill. ; 24 cm.
- 서지 등 주기
- Includes bibliographical references and index.
- 내용주기
- 완전내용Cybercrime and espionage and the new security 101 -- Evolution revolution -- The silent killer : how regulatory compliance has worsened the state of information security -- Mediating the great divorce : the convergence of physical and logical security -- Nonstate sponsored attacks : stealing information is our business, and business is good -- State-sponsored intelligence -- Cyber X : criminal syndicates, nation states, subnational entities, and beyond -- The rise of the subversive multivector threats -- Seven commonalities of subversive multivector threats -- Examples of compromise and presence of subversive multivector threats -- Hiding in plain sight : next-generation techniques and tools for avoidance and obfuscation -- Weapons of our warfare : next-generation techniques and tools for detection, identification, and analysis.
- 요약 등 주기
- 요약Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information. Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights. Presents never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them.
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 부출표목-개인명
- 부출표목-개인명
MARC
008120208s2011 maua 001 0 eng d■001MOKWON00733939
■00520120208140702
■008120208s2011 maua 001 0 eng d
■010 ▼a2011281246
■015 ▼aGBB0B1061
■020 ▼a9781597496131 (pbk.)▼c$59.95
■020 ▼a1597496138 (pbk.)
■035 ▼a(KERIS)BIB000012538788
■040 ▼a211006▼c211006▼d211006▼d225006
■05000▼aHV6773▼b.G724 2011
■08204▼a364.168▼222
■090 ▼a364.168▼bG737c
■1001 ▼aGragido, Will
■24510▼aCybercrime and espionage▼ban analysis of subversive multivector threats▼c[by] Will Gragido, John Pirc ; Russ Rogers, technical editor.
■260 ▼aRockland, Mass.▼bSyngress▼aOxford▼bElsevier Science [distributor]▼cc2011.
■300 ▼axv, 254 p▼bill.▼c24 cm.
■504 ▼aIncludes bibliographical references and index.
■5050 ▼aCybercrime and espionage and the new security 101 -- Evolution revolution -- The silent killer : how regulatory compliance has worsened the state of information security -- Mediating the great divorce : the convergence of physical and logical security -- Nonstate sponsored attacks : stealing information is our business, and business is good -- State-sponsored intelligence -- Cyber X : criminal syndicates, nation states, subnational entities, and beyond -- The rise of the subversive multivector threats -- Seven commonalities of subversive multivector threats -- Examples of compromise and presence of subversive multivector threats -- Hiding in plain sight : next-generation techniques and tools for avoidance and obfuscation -- Weapons of our warfare : next-generation techniques and tools for detection, identification, and analysis.
■520 ▼aCybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information. Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights. Presents never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them.
■650 0▼aComputer crimes.
■650 0▼aEspionage.
■650 0▼aSecurity systems.
■650 0▼aComputer crimes▼xPrevention.
■650 0▼aBusiness intelligence.
■650 0▼aThreats▼xSafety measures.
■7001 ▼aPirc, John.
■7001 ▼aRogers, Russ.
![Cybercrime and espionage : an analysis of subversive multivector threats / [by] Will Gragi...](https://shopping-phinf.pstatic.net/main_3247429/32474291949.20221230072545.jpg)

