000 | 03583cam a2200421 a 4500 | ||
---|---|---|---|
001 | 16721973 | ||
005 | 20141105143502.0 | ||
008 | 110405s2011 maua 001 0 eng d | ||
906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
925 | 0 |
_aacquire _b2 shelf copies _xpolicy default |
|
955 |
_dxj03 2011-10-26 _exj11 2011-10-28 to Dewey |
||
010 | _a 2011281246 | ||
015 |
_aGBB0B1061 _2bnb |
||
016 | 7 |
_a015649812 _2Uk |
|
020 | _a9781597496131 (pbk.) | ||
020 | _a1597496138 (pbk.) | ||
035 | _a(OCoLC)ocn657600279 | ||
040 |
_aUKM _cUKM _dBTCTA _dYDXCP _dBWX _dONU _dNLGGC _dMTG _dDLC |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aHV6773 _b.G724 2011 |
082 | 0 | 4 |
_a364.168 _222 |
084 |
_a54.89 _2bcl |
||
100 | 1 | _aGragido, Will. | |
245 | 1 | 0 |
_aCybercrime and espionage : _ban analysis of subversive multivector threats / _c[by] Will Gragido, John Pirc ; Russ Rogers, technical editor. |
260 |
_aRockland, Mass. : _bSyngress ; _aOxford : _bElsevier Science [distributor], _cc2011. |
||
300 |
_axv, 254 p. : _bill. ; _c24 cm. |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aCybercrime and espionage and the new security 101 -- Evolution revolution -- The silent killer : how regulatory compliance has worsened the state of information security -- Mediating the great divorce : the convergence of physical and logical security -- Nonstate sponsored attacks : stealing information is our business, and business is good -- State-sponsored intelligence -- Cyber X : criminal syndicates, nation states, subnational entities, and beyond -- The rise of the subversive multivector threats -- Seven commonalities of subversive multivector threats -- Examples of compromise and presence of subversive multivector threats -- Hiding in plain sight : next-generation techniques and tools for avoidance and obfuscation -- Weapons of our warfare : next-generation techniques and tools for detection, identification, and analysis. | |
520 | _aCybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information. Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights. Presents never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them. | ||
650 | 0 | _aComputer crimes. | |
650 | 0 | _aEspionage. | |
650 | 0 | _aSecurity systems. | |
650 | 0 |
_aComputer crimes _xPrevention. |
|
650 | 0 | _aBusiness intelligence. | |
650 | 0 |
_aThreats _xSafety measures. |
|
700 | 1 | _aPirc, John. | |
700 | 1 | _aRogers, Russ. | |
999 |
_c25277 _d25277 |