top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Enterprise Cybersecurity : How to Build a Successful Cyberdefense Program Against Advanced Threats / / by Scott Donaldson, Stanley Siegel, Chris K. Williams, Abdul Aslam
Enterprise Cybersecurity : How to Build a Successful Cyberdefense Program Against Advanced Threats / / by Scott Donaldson, Stanley Siegel, Chris K. Williams, Abdul Aslam
Autore Donaldson Scott E.
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2015
Descrizione fisica 1 online resource (508 p.)
Disciplina 004
Collana Expert's Voice in Cybersecurity
Soggetto topico Data protection
Data encryption (Computer science)
Security
Cryptology
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents at a Glance; Contents; Foreword; About the Authors; Acknowledgments ; Introduction; Part I: The Cybersecurity Challenge ; Chapter 1: Defining the Cybersecurity Challenge; The Cyberattacks of Today; The Sony Pictures Entertainment Breach of 2014; Advanced Persistent Threats; Waves of Malware; Types of Cyberattackers; Commodity Threats; Hacktivists; Organized Crime ; Espionage ; Cyberwar ; The Types of Cyberattacks; Confidentiality: Steal Data; Integrity: Modify Data (Steal Money); Availability: Deny Access; The Steps of a Cyberintrusion; Attack Trees and Attack Graphs
Lockheed Martin Kill Chain Mandiant Attack Life Cycle; Enterprise Cybersecurity Attack Sequence; Why Cyberintrusions Succeed; The Explosion in Connectivity; Consolidation of Enterprise IT; Defeat of Preventive Controls; Failure of Detective Controls; Compliance over Capability; The Gap in Cybersecurity Effectiveness; A New Cybersecurity Mindset; An Effective Enterprise Cybersecurity Program; Chapter 2: Meeting the Cybersecurity Challenge; Cybersecurity Frameworks; The Cybersecurity Process; Cybersecurity Challenges; The Risk Management Process
Considering Vulnerabilities, Threats, and Risks Risk Analysis and Mitigation; Cybersecurity Controls; Cybersecurity Capabilities; Cybersecurity and Enterprise IT; Emplacing Cyberdefenses ; H ow Cyberdefenses Interconnect; An Enterprise Cybersecurity Architecture; Part II: A New Enterprise Cybersecurity Architecture ; Chapter 3: Enterprise Cybersecurity Architecture; Systems Administration; S ystems Administration: Goal and Objectives ; Systems Administration: Threat Vectors ; Systems Administration: Capabilities; Network Security; Network Security: Goal and Objectives
Network Security: Threat Vectors Network Security: Capabilities ; Application Security; Application Security: Goal and Objectives ; Application Security: Threat Vectors ; Application Security: Capabilities ; Endpoint, Server, and Device Security; Endpoint, Server, and Device Security: Goal and Objectives ; Endpoint, Server, and Device Security: Threat Vectors ; Endpoint, Server, and Device Security: Capabilities ; Identity, Authentication, and Access Management; Identity, Authentication, and Access Management: Goal and Objectives
Identity, Authentication, and Access Management: Threat Vectors Identity, Authentication, and Access Management: Capabilities; Data Protection and Cryptography; Data Protection and Cryptography: Goal and Objectives ; Data Protection and Cryptography: Threat Vectors ; Data Protection and Cryptography: Capabilities ; Monitoring, Vulnerability, and Patch Management; Monitoring, Vulnerability, and Patch Management: Goal and Objectives ; Monitoring, Vulnerability, and Patch Management: Threat Vectors; Monitoring, Vulnerability, and Patch Management: Capabilities
High Availability, Disaster Recovery, and Physical Protection
Altri titoli varianti How to build a successful cyberdefense program against advanced threats
Record Nr. UNINA-9910300637303321
Donaldson Scott E.  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Understanding security issues / / Scott E. Donaldson, Chris K. Williams, and Stanley G. Siegel
Understanding security issues / / Scott E. Donaldson, Chris K. Williams, and Stanley G. Siegel
Autore Donaldson Scott E.
Pubbl/distr/stampa Boston : , : Walter de Gruyter Incorporated, , [2019]
Descrizione fisica 1 online resource (208 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-5015-0636-6
1-5015-0650-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- About DeG PRESS -- Acknowledgments -- About the Authors -- Contents -- Introduction -- Chapter 1. Security Mindset -- Chapter 2. Common Cybersecurity Attacks -- Chapter 3. Protecting Your Computer(s) -- Chapter 4. Protecting Your Passwords -- Chapter 5. Protecting Your Home Network -- Chapter 6. Smartphones and Tablets -- Chapter 7. Protecting Your Web Browsing -- Chapter 8. Protecting Your E-Mail and Phone Calls -- Chapter 9. Protecting Your Identity, Privacy, and Family Online -- Chapter 10. Protecting Yourself on Travel -- Chapter 11. When Things Go Wrong -- Chapter 12. Considering Cybersecurity at Work -- Chapter 13. Final Thoughts -- Appendix A. Common Online Scams -- Appendix B. The Worst Passwords Ever -- Appendix C. Online Security Resources -- Glossary -- Index
Record Nr. UNINA-9910467494003321
Donaldson Scott E.  
Boston : , : Walter de Gruyter Incorporated, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Understanding security issues / / Scott E. Donaldson, Chris K. Williams, and Stanley G. Siegel
Understanding security issues / / Scott E. Donaldson, Chris K. Williams, and Stanley G. Siegel
Autore Donaldson Scott E.
Pubbl/distr/stampa Boston : , : Walter de Gruyter Incorporated, , [2019]
Descrizione fisica 1 online resource (208 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-5015-0636-6
1-5015-0650-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- About DeG PRESS -- Acknowledgments -- About the Authors -- Contents -- Introduction -- Chapter 1. Security Mindset -- Chapter 2. Common Cybersecurity Attacks -- Chapter 3. Protecting Your Computer(s) -- Chapter 4. Protecting Your Passwords -- Chapter 5. Protecting Your Home Network -- Chapter 6. Smartphones and Tablets -- Chapter 7. Protecting Your Web Browsing -- Chapter 8. Protecting Your E-Mail and Phone Calls -- Chapter 9. Protecting Your Identity, Privacy, and Family Online -- Chapter 10. Protecting Yourself on Travel -- Chapter 11. When Things Go Wrong -- Chapter 12. Considering Cybersecurity at Work -- Chapter 13. Final Thoughts -- Appendix A. Common Online Scams -- Appendix B. The Worst Passwords Ever -- Appendix C. Online Security Resources -- Glossary -- Index
Record Nr. UNINA-9910793330403321
Donaldson Scott E.  
Boston : , : Walter de Gruyter Incorporated, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Understanding security issues / / Scott E. Donaldson, Chris K. Williams, and Stanley G. Siegel
Understanding security issues / / Scott E. Donaldson, Chris K. Williams, and Stanley G. Siegel
Autore Donaldson Scott E.
Pubbl/distr/stampa Boston : , : Walter de Gruyter Incorporated, , [2019]
Descrizione fisica 1 online resource (208 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-5015-0636-6
1-5015-0650-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- About DeG PRESS -- Acknowledgments -- About the Authors -- Contents -- Introduction -- Chapter 1. Security Mindset -- Chapter 2. Common Cybersecurity Attacks -- Chapter 3. Protecting Your Computer(s) -- Chapter 4. Protecting Your Passwords -- Chapter 5. Protecting Your Home Network -- Chapter 6. Smartphones and Tablets -- Chapter 7. Protecting Your Web Browsing -- Chapter 8. Protecting Your E-Mail and Phone Calls -- Chapter 9. Protecting Your Identity, Privacy, and Family Online -- Chapter 10. Protecting Yourself on Travel -- Chapter 11. When Things Go Wrong -- Chapter 12. Considering Cybersecurity at Work -- Chapter 13. Final Thoughts -- Appendix A. Common Online Scams -- Appendix B. The Worst Passwords Ever -- Appendix C. Online Security Resources -- Glossary -- Index
Record Nr. UNINA-9910816705003321
Donaldson Scott E.  
Boston : , : Walter de Gruyter Incorporated, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui