跳到内容
Advanced persistent threat : understanding the danger and how to protect your organization 预览资料
关闭预览资料
正在查...

Advanced persistent threat : understanding the danger and how to protect your organization

著者: Eric Cole
出版商: Waltham, MA : Syngress, 2012.
版本/格式:   电子图书 : 文献 : 英语查看所有的版本和格式
数据库:WorldCat
提要:
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to  再读一些...
评估:

(尚未评估) 0 附有评论 - 争取成为第一个。

主题
更多类似这样的

 

在线查找

与资料的链接

在图书馆查找

&AllPage.SpinnerRetrieving; 正在查找有这资料的图书馆...

详细书目

类型/形式: Electronic books
材料类型: 文献, 互联网资源
文件类型: 互联网资源, 计算机文档
所有的著者/提供者: Eric Cole
OCLC号码: 819636702
描述: 1 online resource
内容: The changing threat --
Why are organizations being compromised --
How are organizations being compromised --
Risk based approach to security --
Protecting your data --
Prevention is ideal but detection is a must --
Respond and recover --
Technologies for success --
The changing landscape: cloud and mobilization --
Proactive security and reputational ranking --
Focusing in on the right security --
Implementing adaptive security.
责任: Eric Cole.

摘要:

Discusses the critical information that readers need to know about APT and how to avoid being a victim. This book covers what you need to know including: How and why organizations are being attacked;  再读一些...

评论

社评

出版商概要

"Cole explains why advanced persistence threats are able to bypass security measures on many large computer systems and recommends how to protect an organization's data from these well-organized 再读一些...

 
用户提供的评论
正在获取GoodReads评论...
正在检索DOGObooks的评论

标签

争取是第一个!
确认申请

你可能已经申请过这份资料。如果还是想申请,请选确认。

链接数据


<http://www.worldcat.org/oclc/819636702>
library:oclcnum"819636702"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/819636702>
rdf:typeschema:Book
schema:about
schema:about
<http://id.worldcat.org/fast/872298>
rdf:typeschema:Intangible
schema:name"Computer networks--Access control"
schema:name"Computer networks--Access control."
schema:about
<http://id.worldcat.org/fast/1751426>
rdf:typeschema:Intangible
schema:name"Internet--Security measures"
schema:name"Internet--Security measures."
schema:about
schema:about
<http://id.worldcat.org/fast/872341>
rdf:typeschema:Intangible
schema:name"Computer networks--Security measures"
schema:name"Computer networks--Security measures."
schema:about
schema:about
schema:bookFormatschema:EBook
schema:creator
schema:datePublished"2012"
schema:description"The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. Advanced Persistent Threat covers what you need to know including: How and why organizations are being attacked . How to develop a "Risk based Approach to Security". Tools for protecting data and preventing attacks. Critical information on how to respond and recover from an intrusion. The emerging threat to Cloud based networks."
schema:description"The changing threat -- Why are organizations being compromised -- How are organizations being compromised -- Risk based approach to security -- Protecting your data -- Prevention is ideal but detection is a must -- Respond and recover -- Technologies for success -- The changing landscape: cloud and mobilization -- Proactive security and reputational ranking -- Focusing in on the right security -- Implementing adaptive security."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1182848422>
schema:genre"Electronic books."
schema:inLanguage"en"
schema:name"Advanced persistent threat understanding the danger and how to protect your organization"
schema:publisher
schema:url<http://lib.myilibrary.com?id=412326>
schema:url
schema:url<http://www.sciencedirect.com/science/book/9781597499491>

Content-negotiable representations

关闭窗口

请登入WorldCat 

没有张号吗?很容易就可以 建立免费的账号.