Cyber Security Essentials
Herausgeber: Graham, James; Olson, Ryan; Howard, Rick
Cyber Security Essentials
Herausgeber: Graham, James; Olson, Ryan; Howard, Rick
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
A collection of intelligence and security articles that covers common security terms and vulnerabilities, such as Stack Based Buffer Overflows, Malware_Naming, Fast-Flux, SQL Injection, and Format_String_ Vulnerability.
Andere Kunden interessierten sich auch für
- David B. Skillicorn (Queen's University, Kingston, Ontario, Canada)Cybersecurity for Everyone66,99 €
- William J. BuchananIntroduction to Security and Network Forensics82,99 €
- Greg SchulzThe Green and Virtual Data Center102,99 €
- Jesse VarsaloneDefense Against the Black Arts81,99 €
- Park ForemanVulnerability Management50,99 €
- Tyler Justin SpeedAsset Protection through Security Awareness78,99 €
- Preeti Mishra (Graphic Era Univ. Uttarakhand)Cloud Security155,99 €
-
-
-
A collection of intelligence and security articles that covers common security terms and vulnerabilities, such as Stack Based Buffer Overflows, Malware_Naming, Fast-Flux, SQL Injection, and Format_String_ Vulnerability.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 344
- Erscheinungstermin: 27. Juli 2017
- Englisch
- Abmessung: 161mm x 241mm x 27mm
- Gewicht: 680g
- ISBN-13: 9781138440401
- ISBN-10: 113844040X
- Artikelnr.: 49207921
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 344
- Erscheinungstermin: 27. Juli 2017
- Englisch
- Abmessung: 161mm x 241mm x 27mm
- Gewicht: 680g
- ISBN-13: 9781138440401
- ISBN-10: 113844040X
- Artikelnr.: 49207921
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
This book is the direct result of the outstanding efforts of a talented pool of security analysts, editors, business leaders and security professionals, all of whom work for iDefense Security Intelligence Services; a business unit of VeriSign, Inc. iDefense is an open-source, cyber security intelligence operation that maintains expertise in vulnerability research and alerting, exploit development, malicious code analysis, underground monitoring and international actor attribution. iDefense provides intelligence products to Fortune 1,000 companies and three-letter agencies in various world governments. iDefense also maintains the Security Operations Center for the Financial Sector Information Sharing and Analysis Center (FS-ISAC); one of 17 ISACs mandated by the US government to facilitate information sharing throughout the country's business sectors. iDefense has the industry-unique capability of determining not only the technical details of cyber security threats and events (the what, the when and the where), but because of their international presence, iDefense personnel can ascertain the most likely actors and motivations behind these attacks (the who and the why). For more information, please contact customerservice@idefense.com.
Cyber Security Fundamentals. Network and Security Concepts. Microsoft
Windows Security Principles. Attacker Techniques and Motivations. How
Hackers Cover Their Tracks (Anti-forensics). Fraud Techniques. Threat
Infrastructure. Exploitation. Techniques to Gain a Foothold. Misdirection,
Reconnaissance and Disruption Methods. Malicious Code. Self-Replicating
Malicious Code. Evading Detection and Elevating Privileges. Stealing
Information and Exploitation. Defense and Analysis Techniques. Memory
Forensics. Honeypots. Malicious Code Naming. Automated Malicious Code
Analysis Systems. Intrusion Detection Systems. iDefense Special File
Investigation Tools.
Windows Security Principles. Attacker Techniques and Motivations. How
Hackers Cover Their Tracks (Anti-forensics). Fraud Techniques. Threat
Infrastructure. Exploitation. Techniques to Gain a Foothold. Misdirection,
Reconnaissance and Disruption Methods. Malicious Code. Self-Replicating
Malicious Code. Evading Detection and Elevating Privileges. Stealing
Information and Exploitation. Defense and Analysis Techniques. Memory
Forensics. Honeypots. Malicious Code Naming. Automated Malicious Code
Analysis Systems. Intrusion Detection Systems. iDefense Special File
Investigation Tools.
Cyber Security Fundamentals. Network and Security Concepts. Microsoft
Windows Security Principles. Attacker Techniques and Motivations. How
Hackers Cover Their Tracks (Anti-forensics). Fraud Techniques. Threat
Infrastructure. Exploitation. Techniques to Gain a Foothold. Misdirection,
Reconnaissance and Disruption Methods. Malicious Code. Self-Replicating
Malicious Code. Evading Detection and Elevating Privileges. Stealing
Information and Exploitation. Defense and Analysis Techniques. Memory
Forensics. Honeypots. Malicious Code Naming. Automated Malicious Code
Analysis Systems. Intrusion Detection Systems. iDefense Special File
Investigation Tools.
Windows Security Principles. Attacker Techniques and Motivations. How
Hackers Cover Their Tracks (Anti-forensics). Fraud Techniques. Threat
Infrastructure. Exploitation. Techniques to Gain a Foothold. Misdirection,
Reconnaissance and Disruption Methods. Malicious Code. Self-Replicating
Malicious Code. Evading Detection and Elevating Privileges. Stealing
Information and Exploitation. Defense and Analysis Techniques. Memory
Forensics. Honeypots. Malicious Code Naming. Automated Malicious Code
Analysis Systems. Intrusion Detection Systems. iDefense Special File
Investigation Tools.