LEADER 00963nam0-22003011i-450- 001 990006984760403321 005 20011026 035 $a000698476 035 $aFED01000698476 035 $a(Aleph)000698476FED01 035 $a000698476 100 $a20011026d1957----km-y0itay50------ba 101 0 $ager 102 $aDE 105 $ay---n---001yy 200 1 $aFristen im Rechtsleben$edie gesetzlichen Fristen im Staatsrecht, Zivil- und Strafrecht, Handels-, Gewerbe- und Steuerrecht sowie den einschlägigen Nebengesetzen$fvon Christian Fuchs und Heinz Gaumann 210 $aKöln$aBerlin$cCarl Heymanns Verlag KG$d1957 215 $a331 p.$d24 cm 676 $a340$v20$zita 700 1$aFuchs,$bChristian$0257016 701 1$aGaumann,$bHeinz$0257017 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006984760403321 952 $aXVIII 33$b51943$fFGBC 959 $aFGBC 996 $aFristen im Rechtsleben$9701007 997 $aUNINA LEADER 03027oam 2200493 450 001 9910583064103321 005 20190911100031.0 035 $a(OCoLC)962064634 035 $a(MiFhGG)GVRL02VN 035 $a(EXLCZ)993710000000918309 100 $a20160719h20172017 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced persistent security $ea cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /$fIra Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor 205 $a1st edition 210 1$aCambridge, MA :$cSyngress,$d[2017] 210 4$d?2017 215 $a1 online resource (xvii, 241 pages) 225 0 $aGale eBooks 300 $aIncludes index. 311 $a0-12-809316-1 311 $a0-12-809365-X 320 $aIncludes bibliographical references and index. 327 $aWhat is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures -- Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Know yourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security. 330 $aAdvanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face. Contains practical and cost-effective recommendations for proactive and reactive protective measures Teaches users how to establish a viable threat intelligence program Focuses on how social networks present a double-edged sword against security programs 606 $aComputer networks$xSecurity measures 606 $aComputer security 606 $aHacking 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aHacking. 676 $a005.8 700 $aWinkler$b Ira$0953871 702 $aTreu Gomes$b Araceli 702 $aShackleford$b Dave 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910583064103321 996 $aAdvanced persistent security$92157078 997 $aUNINA LEADER 03009nam 22005173 450 001 9910158940803321 005 20230807220317.0 010 $a9781786252050 010 $a1786252058 035 $a(CKB)3810000000099150 035 $a(MiAaPQ)EBC4808414 035 $a(Au-PeEL)EBL4808414 035 $a(CaPaEBR)ebr11354542 035 $a(OCoLC)975222083 035 $a(Exl-AI)4808414 035 $a(Perlego)3020977 035 $a(EXLCZ)993810000000099150 100 $a20210901d2015 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe Amphibians Came to Conquer 205 $a1st ed. 210 1$aSan Francisco :$cVerdun Press,$d2015. 210 4$d©2015. 215 $a1 online resource (589 pages) 225 1 $aThe Amphibians Came to Conquer: The Story of Richmond Kelly Turner ;$vv.2 327 $aIntro -- TABLE OF CONTENTS -- Chapter XVI - To the Central Pacific and Tarawa -- Chapter XVII - The Pushover-Makin -- Chapter XVIII - That Real Toughie-Tarawa -- Chapter XIX - At Long Last "The Perfect One" -- Chapter XX - Roi-Namur and the Frosting on the Cake-Eniwetok -- Chapter XXI - The Nut Cracker - Saipan-Tinian-Guam -- Chapter XXII - The Nut Cracker After the Fall of Saipan -- Chapter XXIII - Iwo Jima: Death at Its Best -- Chapter XXIV - Okinawa and Four Stars -- Chapter XXV - End of the War and United Nations Organization Duty -- Chapter XXVI - The Long Last Mile -- Appendix A - USS Richmond K. Turner -- Appendix B - A Note on Primary Sources -- Appendix C - The Last Word -- Bibliography -- Sources -- Books and Articles. 330 $aThis volume, written by Vice Admiral George Carroll Dyer, USN (Retired), focuses on the military career and impact of Admiral Richmond Kelly Turner during World War II. It chronicles crucial amphibious operations in the Pacific theater, emphasizing the strategic and logistical challenges faced by the U.S. Navy. The book delves into Turner's leadership in key battles, such as Tarawa, Iwo Jima, and Okinawa, highlighting his role in shaping naval warfare strategy. The narrative is supported by detailed illustrations and charts, providing insight into naval organization and operations. The work is aimed at military historians, naval enthusiasts, and readers interested in World War II history.$7Generated by AI. 410 4$aThe Amphibians Came to Conquer: The Story of Richmond Kelly Turner 517 $aAmphibians Came to Conquer 606 $aWorld War, 1939-1945$7Generated by AI 606 $aAmphibious warfare$7Generated by AI 615 0$aWorld War, 1939-1945 615 0$aAmphibious warfare 700 $aDyer$b Vice Admiral George C$01374707 701 $aEller$b Rear Admiral Earnest McNeill$01374708 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910158940803321 996 $aThe Amphibians Came to Conquer$93408141 997 $aUNINA