Advanced persistent threat understanding the danger and how to protect your organization Dr. Eric Cole.
Material type: TextDescription: xvi, 290 pages : illustrations 24 cmISBN: 9781597499491 (alk. paper)Subject(s): Computer networks -- Security measures | Computer security | Data protection | Computer crimes -- PreventionLOC classification: QA76.9.A25 C5966 2013 | QA76.9.A25 C5966 2013Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
BOOK | UNIMY PJ Library | QA76.9.A25 C5966 2013 (Browse shelf (Opens below)) | Available | 101692 |
Browsing UNIMY shelves, Shelving location: PJ Library Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
QA76.9 A25 .T375 2013 Information security management principles | QA76.9.A25 B774 2013 Risk management framework a lab-based approach to securing information systems | QA76.9.A25 C438 2014 The basics of digital privacy simple tools to protect your personal information and your identity online | QA76.9.A25 C5966 2013 Advanced persistent threat understanding the danger and how to protect your organization | QA76.9.A25 C627 2013 Computer and information security handbook | QA76.9.A25 D378 2010 Hacking exposed malware & rootkits malware & rootkits security secrets & solutions | QA76.9.A25 D815 2008 Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography / |
Includes bibliographical references and index.
The changing threat -- Why are organizations being compromised -- How are organizations being compromised -- Risk based approach to security -- Protecting your data -- Prevention is ideal but detection is a must -- Respond and recover -- Technologies for success -- The changing landscape: cloud and mobilization -- Proactive security and reputational ranking -- Focusing in on the right security -- Implementing adaptive security.
There are no comments on this title.