Advanced persistent threat understanding the danger and how to protect your organization

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Cole, Eric (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Waltham, MA Syngress 2012
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV042305255
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 150129s2012 |||| o||u| ||||||eng d
020 |a 9781597499491  |9 978-1-59749-949-1 
020 |a 1597499498  |9 1-59749-949-8 
035 |a (OCoLC)819636702 
035 |a (DE-599)BVBBV042305255 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046 
082 0 |a 005.8  |2 23 
100 1 |a Cole, Eric  |e Verfasser  |4 aut 
245 1 0 |a Advanced persistent threat  |b understanding the danger and how to protect your organization  |c Eric Cole 
264 1 |a Waltham, MA  |b Syngress  |c 2012 
300 |a 1 Online-Ressource (1 online resource) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. Advanced Persistent Threat covers what you need to know including: How and why organizations are being attacked . How to develop a "Risk based Approach to Security". Tools for protecting data and preventing attacks. Critical information on how to respond and recover from an intrusion. The emerging threat to Cloud based networks 
650 7 |a Computer networks / Access control  |2 fast 
650 7 |a Computer networks / Security measures  |2 fast 
650 7 |a Internet / Security measures  |2 fast 
650 4 |a Computer networks  |x Security measures 
650 4 |a Computer networks  |x Access control 
650 4 |a Internet  |x Security measures 
856 4 0 |u http://www.sciencedirect.com/science/book/9781597499491  |x Verlag  |3 Volltext 
912 |a ZDB-33-ESD  |a ZDB-33-EBS 
940 1 |q FAW_PDA_ESD 
940 1 |q FLA_PDA_ESD 
999 |a oai:aleph.bib-bvb.de:BVB01-027742247 

Datensatz im Suchindex

_version_ 1804152888132370432
any_adam_object
author Cole, Eric
author_facet Cole, Eric
author_role aut
author_sort Cole, Eric
author_variant e c ec
building Verbundindex
bvnumber BV042305255
collection ZDB-33-ESD
ZDB-33-EBS
ctrlnum (OCoLC)819636702
(DE-599)BVBBV042305255
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02572nmm a2200409zc 4500</leader><controlfield tag="001">BV042305255</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499491</subfield><subfield code="9">978-1-59749-949-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499498</subfield><subfield code="9">1-59749-949-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)819636702</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305255</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cole, Eric</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced persistent threat</subfield><subfield code="b">understanding the danger and how to protect your organization</subfield><subfield code="c">Eric Cole</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. Advanced Persistent Threat covers what you need to know including: How and why organizations are being attacked . How to develop a "Risk based Approach to Security". Tools for protecting data and preventing attacks. Critical information on how to respond and recover from an intrusion. The emerging threat to Cloud based networks</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597499491</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742247</subfield></datafield></record></collection>
id DE-604.BV042305255
illustrated Not Illustrated
indexdate 2024-07-10T01:17:52Z
institution BVB
isbn 9781597499491
1597499498
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-027742247
oclc_num 819636702
open_access_boolean
owner DE-1046
owner_facet DE-1046
physical 1 Online-Ressource (1 online resource)
psigel ZDB-33-ESD
ZDB-33-EBS
FAW_PDA_ESD
FLA_PDA_ESD
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Syngress
record_format marc
spelling Cole, Eric Verfasser aut
Advanced persistent threat understanding the danger and how to protect your organization Eric Cole
Waltham, MA Syngress 2012
1 Online-Ressource (1 online resource)
txt rdacontent
c rdamedia
cr rdacarrier
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. Advanced Persistent Threat covers what you need to know including: How and why organizations are being attacked . How to develop a "Risk based Approach to Security". Tools for protecting data and preventing attacks. Critical information on how to respond and recover from an intrusion. The emerging threat to Cloud based networks
Computer networks / Access control fast
Computer networks / Security measures fast
Internet / Security measures fast
Computer networks Security measures
Computer networks Access control
Internet Security measures
http://www.sciencedirect.com/science/book/9781597499491 Verlag Volltext
spellingShingle Cole, Eric
Advanced persistent threat understanding the danger and how to protect your organization
Computer networks / Access control fast
Computer networks / Security measures fast
Internet / Security measures fast
Computer networks Security measures
Computer networks Access control
Internet Security measures
title Advanced persistent threat understanding the danger and how to protect your organization
title_auth Advanced persistent threat understanding the danger and how to protect your organization
title_exact_search Advanced persistent threat understanding the danger and how to protect your organization
title_full Advanced persistent threat understanding the danger and how to protect your organization Eric Cole
title_fullStr Advanced persistent threat understanding the danger and how to protect your organization Eric Cole
title_full_unstemmed Advanced persistent threat understanding the danger and how to protect your organization Eric Cole
title_short Advanced persistent threat
title_sort advanced persistent threat understanding the danger and how to protect your organization
title_sub understanding the danger and how to protect your organization
topic Computer networks / Access control fast
Computer networks / Security measures fast
Internet / Security measures fast
Computer networks Security measures
Computer networks Access control
Internet Security measures
topic_facet Computer networks / Access control
Computer networks / Security measures
Internet / Security measures
Computer networks Security measures
Computer networks Access control
Internet Security measures
url http://www.sciencedirect.com/science/book/9781597499491
work_keys_str_mv AT coleeric advancedpersistentthreatunderstandingthedangerandhowtoprotectyourorganization