000 03583cam a2200421 a 4500
001 16721973
005 20141105143502.0
008 110405s2011 maua 001 0 eng d
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
925 0 _aacquire
_b2 shelf copies
_xpolicy default
955 _dxj03 2011-10-26
_exj11 2011-10-28 to Dewey
010 _a 2011281246
015 _aGBB0B1061
_2bnb
016 7 _a015649812
_2Uk
020 _a9781597496131 (pbk.)
020 _a1597496138 (pbk.)
035 _a(OCoLC)ocn657600279
040 _aUKM
_cUKM
_dBTCTA
_dYDXCP
_dBWX
_dONU
_dNLGGC
_dMTG
_dDLC
042 _alccopycat
050 0 0 _aHV6773
_b.G724 2011
082 0 4 _a364.168
_222
084 _a54.89
_2bcl
100 1 _aGragido, Will.
245 1 0 _aCybercrime and espionage :
_ban analysis of subversive multivector threats /
_c[by] Will Gragido, John Pirc ; Russ Rogers, technical editor.
260 _aRockland, Mass. :
_bSyngress ;
_aOxford :
_bElsevier Science [distributor],
_cc2011.
300 _axv, 254 p. :
_bill. ;
_c24 cm.
504 _aIncludes bibliographical references and index.
505 0 _aCybercrime and espionage and the new security 101 -- Evolution revolution -- The silent killer : how regulatory compliance has worsened the state of information security -- Mediating the great divorce : the convergence of physical and logical security -- Nonstate sponsored attacks : stealing information is our business, and business is good -- State-sponsored intelligence -- Cyber X : criminal syndicates, nation states, subnational entities, and beyond -- The rise of the subversive multivector threats -- Seven commonalities of subversive multivector threats -- Examples of compromise and presence of subversive multivector threats -- Hiding in plain sight : next-generation techniques and tools for avoidance and obfuscation -- Weapons of our warfare : next-generation techniques and tools for detection, identification, and analysis.
520 _aCybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information. Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights. Presents never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them.
650 0 _aComputer crimes.
650 0 _aEspionage.
650 0 _aSecurity systems.
650 0 _aComputer crimes
_xPrevention.
650 0 _aBusiness intelligence.
650 0 _aThreats
_xSafety measures.
700 1 _aPirc, John.
700 1 _aRogers, Russ.
999 _c25277
_d25277