top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor
Autore Winkler Ira
Edizione [1st edition]
Pubbl/distr/stampa Cambridge, MA : , : Syngress, , [2017]
Descrizione fisica 1 online resource (xvii, 241 pages)
Disciplina 005.8
Collana Gale eBooks
Soggetto topico Computer networks - Security measures
Computer security
Hacking
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures -- Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Know yourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security.
Record Nr. UNINA-9910583064103321
Winkler Ira  
Cambridge, MA : , : Syngress, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
You can stop stupid : stopping losses from accidental and malicious actions / / Ira Winkler, Dr Tracy Celaya Brown
You can stop stupid : stopping losses from accidental and malicious actions / / Ira Winkler, Dr Tracy Celaya Brown
Autore Winkler Ira
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , [2021]
Descrizione fisica 1 online resource (xxxii, 335 pages) : illustrations
Disciplina 658.47
Soggetto topico Business enterprises - Security measures
Computer security
Quality control
ISBN 1-119-62206-9
1-119-62394-4
1-119-62204-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910555095203321
Winkler Ira  
Indianapolis, Indiana : , : Wiley, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
You can stop stupid : stopping losses from accidental and malicious actions / / Ira Winkler, Dr Tracy Celaya Brown
You can stop stupid : stopping losses from accidental and malicious actions / / Ira Winkler, Dr Tracy Celaya Brown
Autore Winkler Ira
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , [2021]
Descrizione fisica 1 online resource (xxxii, 335 pages) : illustrations
Disciplina 658.47
Soggetto topico Business enterprises - Security measures
Computer security
Quality control
ISBN 1-119-62206-9
1-119-62394-4
1-119-62204-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910677274403321
Winkler Ira  
Indianapolis, Indiana : , : Wiley, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Zen and the art of information security [[electronic resource] /] / Ira Winkler
Zen and the art of information security [[electronic resource] /] / Ira Winkler
Autore Winkler Ira
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress, c2007
Descrizione fisica 1 online resource (193 p.)
Disciplina 364.16/8
658.478
Soggetto topico Computer security
Computer crimes - Prevention
Soggetto genere / forma Electronic books.
ISBN 1-281-07710-0
9786611077105
0-08-055474-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Zen and the Art of Information Security; Copyright Page; Contents; Introduction; Why You Shouldn't Buy This Book; Chapter 1. Zen and the Art of Cybersecurity; Philosophy of Security; Chapter 2. Why l Don't Like the Title of This Book; What Makes a Scientist; Why Some People are Better Scientists; Putting it All Together; Applying Science; Chapter 3. What is Security?; Risk; What is a Security Program?; Optimizing Risk; Consciously Accept Risk; Chapter 4. A Bad Question; Value has Nothing to do With Computers; A Typical Security Budget; Determining A Security Budget
Multiyear BudgetsRemind the CIO the I means Information; Making Risk a Conscious Decision; Chapter 5. What Makes a Master; Mastering Computer Security; Chapter 6. Knights and Dragons; The FUD Factor; Dragons Forgive Incompetency; Terrorists Really Aren't That Good; The People You Really Have to Worry About; Look for Snakes, Not Dragons; Don't Suffer Death By 1,000 Cuts; Chapter 7. Cyberterrorism is Not Effective; Anthrax vs. Nimda; It is Easier to Blow Things Up; What is a Terrorist?; Chapter 8. Common Sense and Common Knowledge; Wanting Benefit Without the Associated Costs
Some People Are Just StupidThe Wizard of Oz; Chapter 9. Never Underestimate the Stupidity of a Criminal; There is a Difference Between Being Good and Being Effective; Understanding your Adversary; The Criminal Mindset; Your Kids are Notas Smart as You Think; Chapter 10. Information Security Is INFORMATION Security; Chapter 11. Is Security a Should or a Must?; Management Must Believe Security is a Must; So is Security a Should or a Must For You?; Chapter 12. If You Don't Remember History, You Will Repeat It; Chapter 13. Ira's Golden Rules; Take Responsibility; Decide Security is a Must
Educate YourselfRemember, You are Protecting Information; Protecting Your Computer; Note on Security Software; The 95/5 Rule; Chapter 14. Chance Favors the Prepared; Ubiquitous Security; The Purpose of This Book; Technology is Still Important; Security is Really Risk Management; Be Responsible; Appendix A: Critical Moments in Computer Security History; Index; Syngress: The Definition of a Serious Security Library
Altri titoli varianti Ira Winkler's zen of security
Record Nr. UNINA-9910458840203321
Winkler Ira  
Rockland, MA, : Syngress, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Zen and the art of information security [[electronic resource] /] / Ira Winkler
Zen and the art of information security [[electronic resource] /] / Ira Winkler
Autore Winkler Ira
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress, c2007
Descrizione fisica 1 online resource (193 p.)
Disciplina 364.16/8
658.478
Soggetto topico Computer security
Computer crimes - Prevention
ISBN 1-281-07710-0
9786611077105
0-08-055474-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Zen and the Art of Information Security; Copyright Page; Contents; Introduction; Why You Shouldn't Buy This Book; Chapter 1. Zen and the Art of Cybersecurity; Philosophy of Security; Chapter 2. Why l Don't Like the Title of This Book; What Makes a Scientist; Why Some People are Better Scientists; Putting it All Together; Applying Science; Chapter 3. What is Security?; Risk; What is a Security Program?; Optimizing Risk; Consciously Accept Risk; Chapter 4. A Bad Question; Value has Nothing to do With Computers; A Typical Security Budget; Determining A Security Budget
Multiyear BudgetsRemind the CIO the I means Information; Making Risk a Conscious Decision; Chapter 5. What Makes a Master; Mastering Computer Security; Chapter 6. Knights and Dragons; The FUD Factor; Dragons Forgive Incompetency; Terrorists Really Aren't That Good; The People You Really Have to Worry About; Look for Snakes, Not Dragons; Don't Suffer Death By 1,000 Cuts; Chapter 7. Cyberterrorism is Not Effective; Anthrax vs. Nimda; It is Easier to Blow Things Up; What is a Terrorist?; Chapter 8. Common Sense and Common Knowledge; Wanting Benefit Without the Associated Costs
Some People Are Just StupidThe Wizard of Oz; Chapter 9. Never Underestimate the Stupidity of a Criminal; There is a Difference Between Being Good and Being Effective; Understanding your Adversary; The Criminal Mindset; Your Kids are Notas Smart as You Think; Chapter 10. Information Security Is INFORMATION Security; Chapter 11. Is Security a Should or a Must?; Management Must Believe Security is a Must; So is Security a Should or a Must For You?; Chapter 12. If You Don't Remember History, You Will Repeat It; Chapter 13. Ira's Golden Rules; Take Responsibility; Decide Security is a Must
Educate YourselfRemember, You are Protecting Information; Protecting Your Computer; Note on Security Software; The 95/5 Rule; Chapter 14. Chance Favors the Prepared; Ubiquitous Security; The Purpose of This Book; Technology is Still Important; Security is Really Risk Management; Be Responsible; Appendix A: Critical Moments in Computer Security History; Index; Syngress: The Definition of a Serious Security Library
Altri titoli varianti Ira Winkler's zen of security
Record Nr. UNINA-9910784619703321
Winkler Ira  
Rockland, MA, : Syngress, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Zen and the art of information security / / Ira Winkler
Zen and the art of information security / / Ira Winkler
Autore Winkler Ira
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress, c2007
Descrizione fisica 1 online resource (193 p.)
Disciplina 364.16/8
658.478
364.168
Soggetto topico Computer security
Computer crimes - Prevention
ISBN 1-281-07710-0
9786611077105
0-08-055474-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Zen and the Art of Information Security; Copyright Page; Contents; Introduction; Why You Shouldn't Buy This Book; Chapter 1. Zen and the Art of Cybersecurity; Philosophy of Security; Chapter 2. Why l Don't Like the Title of This Book; What Makes a Scientist; Why Some People are Better Scientists; Putting it All Together; Applying Science; Chapter 3. What is Security?; Risk; What is a Security Program?; Optimizing Risk; Consciously Accept Risk; Chapter 4. A Bad Question; Value has Nothing to do With Computers; A Typical Security Budget; Determining A Security Budget
Multiyear BudgetsRemind the CIO the I means Information; Making Risk a Conscious Decision; Chapter 5. What Makes a Master; Mastering Computer Security; Chapter 6. Knights and Dragons; The FUD Factor; Dragons Forgive Incompetency; Terrorists Really Aren't That Good; The People You Really Have to Worry About; Look for Snakes, Not Dragons; Don't Suffer Death By 1,000 Cuts; Chapter 7. Cyberterrorism is Not Effective; Anthrax vs. Nimda; It is Easier to Blow Things Up; What is a Terrorist?; Chapter 8. Common Sense and Common Knowledge; Wanting Benefit Without the Associated Costs
Some People Are Just StupidThe Wizard of Oz; Chapter 9. Never Underestimate the Stupidity of a Criminal; There is a Difference Between Being Good and Being Effective; Understanding your Adversary; The Criminal Mindset; Your Kids are Notas Smart as You Think; Chapter 10. Information Security Is INFORMATION Security; Chapter 11. Is Security a Should or a Must?; Management Must Believe Security is a Must; So is Security a Should or a Must For You?; Chapter 12. If You Don't Remember History, You Will Repeat It; Chapter 13. Ira's Golden Rules; Take Responsibility; Decide Security is a Must
Educate YourselfRemember, You are Protecting Information; Protecting Your Computer; Note on Security Software; The 95/5 Rule; Chapter 14. Chance Favors the Prepared; Ubiquitous Security; The Purpose of This Book; Technology is Still Important; Security is Really Risk Management; Be Responsible; Appendix A: Critical Moments in Computer Security History; Index; Syngress: The Definition of a Serious Security Library
Altri titoli varianti Ira Winkler's zen of security
Record Nr. UNINA-9910828687903321
Winkler Ira  
Rockland, MA, : Syngress, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui