Cyber Security Essentials
Herausgeber: Graham, James; Olson, Ryan; Howard, Rick
195,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
Melden Sie sich
hier
hier
für den Produktalarm an, um über die Verfügbarkeit des Produkts informiert zu werden.
Cyber Security Essentials
Herausgeber: Graham, James; Olson, Ryan; Howard, Rick
- Gebundenes Buch
A collection of intelligence and security articles that covers common security terms and vulnerabilities, such as Stack Based Buffer Overflows, Malware_Naming, Fast-Flux, SQL Injection, and Format_String_ Vulnerability.
Andere Kunden interessierten sich auch für
- Simon RogersonEthical Digital Technology in Practice48,99 €
- Mark S. MerkowPractical Security for Agile and DevOps55,99 €
- Barak EngelThe Security Hippie32,99 €
- Stephan P. Kudyba (New Jersey Institute of Technology, Newark, USA)Healthcare Informatics57,99 €
- Brotby, W. Krag, CISMInformation Security Management Metrics111,99 €
- Peter TrimStrategic Cyber Security Management219,99 €
- Joanna F. DeFranco (The Pennsylvania State University, Malvern, USAWhat Every Engineer Should Know About Cyber Security and Digital Forensics162,99 €
-
-
-
A collection of intelligence and security articles that covers common security terms and vulnerabilities, such as Stack Based Buffer Overflows, Malware_Naming, Fast-Flux, SQL Injection, and Format_String_ Vulnerability.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 344
- Erscheinungstermin: 27. Juli 2017
- Englisch
- Abmessung: 161mm x 241mm x 27mm
- Gewicht: 680g
- ISBN-13: 9781138440401
- ISBN-10: 113844040X
- Artikelnr.: 49207921
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 344
- Erscheinungstermin: 27. Juli 2017
- Englisch
- Abmessung: 161mm x 241mm x 27mm
- Gewicht: 680g
- ISBN-13: 9781138440401
- ISBN-10: 113844040X
- Artikelnr.: 49207921
This book is the direct result of the outstanding efforts of a talented pool of security analysts, editors, business leaders and security professionals, all of whom work for iDefense Security Intelligence Services; a business unit of VeriSign, Inc. iDefense is an open-source, cyber security intelligence operation that maintains expertise in vulnerability research and alerting, exploit development, malicious code analysis, underground monitoring and international actor attribution. iDefense provides intelligence products to Fortune 1,000 companies and three-letter agencies in various world governments. iDefense also maintains the Security Operations Center for the Financial Sector Information Sharing and Analysis Center (FS-ISAC); one of 17 ISACs mandated by the US government to facilitate information sharing throughout the country's business sectors. iDefense has the industry-unique capability of determining not only the technical details of cyber security threats and events (the what, the when and the where), but because of their international presence, iDefense personnel can ascertain the most likely actors and motivations behind these attacks (the who and the why). For more information, please contact customerservice@idefense.com.
Cyber Security Fundamentals. Network and Security Concepts. Microsoft
Windows Security Principles. Attacker Techniques and Motivations. How
Hackers Cover Their Tracks (Anti-forensics). Fraud Techniques. Threat
Infrastructure. Exploitation. Techniques to Gain a Foothold. Misdirection,
Reconnaissance and Disruption Methods. Malicious Code. Self-Replicating
Malicious Code. Evading Detection and Elevating Privileges. Stealing
Information and Exploitation. Defense and Analysis Techniques. Memory
Forensics. Honeypots. Malicious Code Naming. Automated Malicious Code
Analysis Systems. Intrusion Detection Systems. iDefense Special File
Investigation Tools.
Windows Security Principles. Attacker Techniques and Motivations. How
Hackers Cover Their Tracks (Anti-forensics). Fraud Techniques. Threat
Infrastructure. Exploitation. Techniques to Gain a Foothold. Misdirection,
Reconnaissance and Disruption Methods. Malicious Code. Self-Replicating
Malicious Code. Evading Detection and Elevating Privileges. Stealing
Information and Exploitation. Defense and Analysis Techniques. Memory
Forensics. Honeypots. Malicious Code Naming. Automated Malicious Code
Analysis Systems. Intrusion Detection Systems. iDefense Special File
Investigation Tools.
Cyber Security Fundamentals. Network and Security Concepts. Microsoft
Windows Security Principles. Attacker Techniques and Motivations. How
Hackers Cover Their Tracks (Anti-forensics). Fraud Techniques. Threat
Infrastructure. Exploitation. Techniques to Gain a Foothold. Misdirection,
Reconnaissance and Disruption Methods. Malicious Code. Self-Replicating
Malicious Code. Evading Detection and Elevating Privileges. Stealing
Information and Exploitation. Defense and Analysis Techniques. Memory
Forensics. Honeypots. Malicious Code Naming. Automated Malicious Code
Analysis Systems. Intrusion Detection Systems. iDefense Special File
Investigation Tools.
Windows Security Principles. Attacker Techniques and Motivations. How
Hackers Cover Their Tracks (Anti-forensics). Fraud Techniques. Threat
Infrastructure. Exploitation. Techniques to Gain a Foothold. Misdirection,
Reconnaissance and Disruption Methods. Malicious Code. Self-Replicating
Malicious Code. Evading Detection and Elevating Privileges. Stealing
Information and Exploitation. Defense and Analysis Techniques. Memory
Forensics. Honeypots. Malicious Code Naming. Automated Malicious Code
Analysis Systems. Intrusion Detection Systems. iDefense Special File
Investigation Tools.