Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor |
Autore | Winkler Ira |
Edizione | [1st edition] |
Pubbl/distr/stampa | Cambridge, MA : , : Syngress, , [2017] |
Descrizione fisica | 1 online resource (xvii, 241 pages) |
Disciplina | 005.8 |
Collana | Gale eBooks |
Soggetto topico |
Computer networks - Security measures
Computer security Hacking |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures -- Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Know yourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security. |
Record Nr. | UNINA-9910583064103321 |
Winkler Ira | ||
Cambridge, MA : , : Syngress, , [2017] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
You can stop stupid : stopping losses from accidental and malicious actions / / Ira Winkler, Dr Tracy Celaya Brown |
Autore | Winkler Ira |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , [2021] |
Descrizione fisica | 1 online resource (xxxii, 335 pages) : illustrations |
Disciplina | 658.47 |
Soggetto topico |
Business enterprises - Security measures
Computer security Quality control |
ISBN |
1-119-62206-9
1-119-62394-4 1-119-62204-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910555095203321 |
Winkler Ira | ||
Indianapolis, Indiana : , : Wiley, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
You can stop stupid : stopping losses from accidental and malicious actions / / Ira Winkler, Dr Tracy Celaya Brown |
Autore | Winkler Ira |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , [2021] |
Descrizione fisica | 1 online resource (xxxii, 335 pages) : illustrations |
Disciplina | 658.47 |
Soggetto topico |
Business enterprises - Security measures
Computer security Quality control |
ISBN |
1-119-62206-9
1-119-62394-4 1-119-62204-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910677274403321 |
Winkler Ira | ||
Indianapolis, Indiana : , : Wiley, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Zen and the art of information security [[electronic resource] /] / Ira Winkler |
Autore | Winkler Ira |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, c2007 |
Descrizione fisica | 1 online resource (193 p.) |
Disciplina |
364.16/8
658.478 |
Soggetto topico |
Computer security
Computer crimes - Prevention |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-07710-0
9786611077105 0-08-055474-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Zen and the Art of Information Security; Copyright Page; Contents; Introduction; Why You Shouldn't Buy This Book; Chapter 1. Zen and the Art of Cybersecurity; Philosophy of Security; Chapter 2. Why l Don't Like the Title of This Book; What Makes a Scientist; Why Some People are Better Scientists; Putting it All Together; Applying Science; Chapter 3. What is Security?; Risk; What is a Security Program?; Optimizing Risk; Consciously Accept Risk; Chapter 4. A Bad Question; Value has Nothing to do With Computers; A Typical Security Budget; Determining A Security Budget
Multiyear BudgetsRemind the CIO the I means Information; Making Risk a Conscious Decision; Chapter 5. What Makes a Master; Mastering Computer Security; Chapter 6. Knights and Dragons; The FUD Factor; Dragons Forgive Incompetency; Terrorists Really Aren't That Good; The People You Really Have to Worry About; Look for Snakes, Not Dragons; Don't Suffer Death By 1,000 Cuts; Chapter 7. Cyberterrorism is Not Effective; Anthrax vs. Nimda; It is Easier to Blow Things Up; What is a Terrorist?; Chapter 8. Common Sense and Common Knowledge; Wanting Benefit Without the Associated Costs Some People Are Just StupidThe Wizard of Oz; Chapter 9. Never Underestimate the Stupidity of a Criminal; There is a Difference Between Being Good and Being Effective; Understanding your Adversary; The Criminal Mindset; Your Kids are Notas Smart as You Think; Chapter 10. Information Security Is INFORMATION Security; Chapter 11. Is Security a Should or a Must?; Management Must Believe Security is a Must; So is Security a Should or a Must For You?; Chapter 12. If You Don't Remember History, You Will Repeat It; Chapter 13. Ira's Golden Rules; Take Responsibility; Decide Security is a Must Educate YourselfRemember, You are Protecting Information; Protecting Your Computer; Note on Security Software; The 95/5 Rule; Chapter 14. Chance Favors the Prepared; Ubiquitous Security; The Purpose of This Book; Technology is Still Important; Security is Really Risk Management; Be Responsible; Appendix A: Critical Moments in Computer Security History; Index; Syngress: The Definition of a Serious Security Library |
Altri titoli varianti | Ira Winkler's zen of security |
Record Nr. | UNINA-9910458840203321 |
Winkler Ira | ||
Rockland, MA, : Syngress, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Zen and the art of information security [[electronic resource] /] / Ira Winkler |
Autore | Winkler Ira |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, c2007 |
Descrizione fisica | 1 online resource (193 p.) |
Disciplina |
364.16/8
658.478 |
Soggetto topico |
Computer security
Computer crimes - Prevention |
ISBN |
1-281-07710-0
9786611077105 0-08-055474-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Zen and the Art of Information Security; Copyright Page; Contents; Introduction; Why You Shouldn't Buy This Book; Chapter 1. Zen and the Art of Cybersecurity; Philosophy of Security; Chapter 2. Why l Don't Like the Title of This Book; What Makes a Scientist; Why Some People are Better Scientists; Putting it All Together; Applying Science; Chapter 3. What is Security?; Risk; What is a Security Program?; Optimizing Risk; Consciously Accept Risk; Chapter 4. A Bad Question; Value has Nothing to do With Computers; A Typical Security Budget; Determining A Security Budget
Multiyear BudgetsRemind the CIO the I means Information; Making Risk a Conscious Decision; Chapter 5. What Makes a Master; Mastering Computer Security; Chapter 6. Knights and Dragons; The FUD Factor; Dragons Forgive Incompetency; Terrorists Really Aren't That Good; The People You Really Have to Worry About; Look for Snakes, Not Dragons; Don't Suffer Death By 1,000 Cuts; Chapter 7. Cyberterrorism is Not Effective; Anthrax vs. Nimda; It is Easier to Blow Things Up; What is a Terrorist?; Chapter 8. Common Sense and Common Knowledge; Wanting Benefit Without the Associated Costs Some People Are Just StupidThe Wizard of Oz; Chapter 9. Never Underestimate the Stupidity of a Criminal; There is a Difference Between Being Good and Being Effective; Understanding your Adversary; The Criminal Mindset; Your Kids are Notas Smart as You Think; Chapter 10. Information Security Is INFORMATION Security; Chapter 11. Is Security a Should or a Must?; Management Must Believe Security is a Must; So is Security a Should or a Must For You?; Chapter 12. If You Don't Remember History, You Will Repeat It; Chapter 13. Ira's Golden Rules; Take Responsibility; Decide Security is a Must Educate YourselfRemember, You are Protecting Information; Protecting Your Computer; Note on Security Software; The 95/5 Rule; Chapter 14. Chance Favors the Prepared; Ubiquitous Security; The Purpose of This Book; Technology is Still Important; Security is Really Risk Management; Be Responsible; Appendix A: Critical Moments in Computer Security History; Index; Syngress: The Definition of a Serious Security Library |
Altri titoli varianti | Ira Winkler's zen of security |
Record Nr. | UNINA-9910784619703321 |
Winkler Ira | ||
Rockland, MA, : Syngress, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Zen and the art of information security / / Ira Winkler |
Autore | Winkler Ira |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, c2007 |
Descrizione fisica | 1 online resource (193 p.) |
Disciplina |
364.16/8
658.478 364.168 |
Soggetto topico |
Computer security
Computer crimes - Prevention |
ISBN |
1-281-07710-0
9786611077105 0-08-055474-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Zen and the Art of Information Security; Copyright Page; Contents; Introduction; Why You Shouldn't Buy This Book; Chapter 1. Zen and the Art of Cybersecurity; Philosophy of Security; Chapter 2. Why l Don't Like the Title of This Book; What Makes a Scientist; Why Some People are Better Scientists; Putting it All Together; Applying Science; Chapter 3. What is Security?; Risk; What is a Security Program?; Optimizing Risk; Consciously Accept Risk; Chapter 4. A Bad Question; Value has Nothing to do With Computers; A Typical Security Budget; Determining A Security Budget
Multiyear BudgetsRemind the CIO the I means Information; Making Risk a Conscious Decision; Chapter 5. What Makes a Master; Mastering Computer Security; Chapter 6. Knights and Dragons; The FUD Factor; Dragons Forgive Incompetency; Terrorists Really Aren't That Good; The People You Really Have to Worry About; Look for Snakes, Not Dragons; Don't Suffer Death By 1,000 Cuts; Chapter 7. Cyberterrorism is Not Effective; Anthrax vs. Nimda; It is Easier to Blow Things Up; What is a Terrorist?; Chapter 8. Common Sense and Common Knowledge; Wanting Benefit Without the Associated Costs Some People Are Just StupidThe Wizard of Oz; Chapter 9. Never Underestimate the Stupidity of a Criminal; There is a Difference Between Being Good and Being Effective; Understanding your Adversary; The Criminal Mindset; Your Kids are Notas Smart as You Think; Chapter 10. Information Security Is INFORMATION Security; Chapter 11. Is Security a Should or a Must?; Management Must Believe Security is a Must; So is Security a Should or a Must For You?; Chapter 12. If You Don't Remember History, You Will Repeat It; Chapter 13. Ira's Golden Rules; Take Responsibility; Decide Security is a Must Educate YourselfRemember, You are Protecting Information; Protecting Your Computer; Note on Security Software; The 95/5 Rule; Chapter 14. Chance Favors the Prepared; Ubiquitous Security; The Purpose of This Book; Technology is Still Important; Security is Really Risk Management; Be Responsible; Appendix A: Critical Moments in Computer Security History; Index; Syngress: The Definition of a Serious Security Library |
Altri titoli varianti | Ira Winkler's zen of security |
Record Nr. | UNINA-9910828687903321 |
Winkler Ira | ||
Rockland, MA, : Syngress, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|