aller au contenu
Advanced persistent threat : understanding the danger and how to protect your organization Aperçu de cet ouvrage
FermerAperçu de cet ouvrage
Vérifiant…

Advanced persistent threat : understanding the danger and how to protect your organization

Auteur : Eric Cole
Éditeur : Waltham, MA : Syngress, 2012.
Édition/format :   Livre électronique : Document : AnglaisVoir toutes les éditions et tous les formats
Base de données :WorldCat
Résumé :
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to  Lire la suite...
Évaluation :

(pas encore évalué) 0 avec des critiques - Soyez le premier.

Sujets
Plus comme ceci

 

Trouver un exemplaire en ligne

Liens vers cet ouvrage

Trouver un exemplaire dans la bibliothèque

&AllPage.SpinnerRetrieving; Recherche de bibliothèques qui possèdent cet ouvrage...

Détails

Genre/forme : Electronic books
Type d’ouvrage : Document, Ressource Internet
Format : Ressource Internet, Fichier informatique
Tous les auteurs / collaborateurs : Eric Cole
Numéro OCLC : 819636702
Description : 1 online resource
Contenu : The changing threat --
Why are organizations being compromised --
How are organizations being compromised --
Risk based approach to security --
Protecting your data --
Prevention is ideal but detection is a must --
Respond and recover --
Technologies for success --
The changing landscape: cloud and mobilization --
Proactive security and reputational ranking --
Focusing in on the right security --
Implementing adaptive security.
Responsabilité : Eric Cole.

Résumé :

Discusses the critical information that readers need to know about APT and how to avoid being a victim. This book covers what you need to know including: How and why organizations are being attacked;  Lire la suite...

Critiques

Critiques éditoriales

Synopsis de l’éditeur

"Cole explains why advanced persistence threats are able to bypass security measures on many large computer systems and recommends how to protect an organization's data from these well-organized Lire la suite...

 
Critiques d’utilisateurs
Récupération des critiques de GoodReads...
Récuperation des critiques DOGObooks…

Tags

Soyez le premier.
Confirmez cette demande

Vous avez peut-être déjà demandé cet ouvrage. Veuillez sélectionner OK si vous voulez poursuivre avec cette demande quand même.

Données liées


<http://www.worldcat.org/oclc/819636702>
library:oclcnum"819636702"
library:placeOfPublication
library:placeOfPublication
rdf:typeschema:MediaObject
rdf:typeschema:Book
rdf:valueUnknown value: dct
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:creator
schema:datePublished"2012"
schema:description"The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. Advanced Persistent Threat covers what you need to know including: How and why organizations are being attacked . How to develop a "Risk based Approach to Security". Tools for protecting data and preventing attacks. Critical information on how to respond and recover from an intrusion. The emerging threat to Cloud based networks."
schema:description"The changing threat -- Why are organizations being compromised -- How are organizations being compromised -- Risk based approach to security -- Protecting your data -- Prevention is ideal but detection is a must -- Respond and recover -- Technologies for success -- The changing landscape: cloud and mobilization -- Proactive security and reputational ranking -- Focusing in on the right security -- Implementing adaptive security."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1182848422>
schema:genre"Electronic books"
schema:inLanguage"en"
schema:name"Advanced persistent threat understanding the danger and how to protect your organization"
schema:publication
schema:publisher
schema:url<http://lib.myilibrary.com?id=412326>
schema:url<http://www.sciencedirect.com/science/book/9781597499491>
wdrs:describedby

Content-negotiable representations

Fermer la fenêtre

Veuillez vous identifier dans WorldCat 

Vous n’avez pas de compte? Vous pouvez facilement créer un compte gratuit.