Advanced persistent threat: understanding the danger and how to protect your organization
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the in...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Boston
Syngress
2013
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781597499491/?ar |
Summary: | The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In "Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization", Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. "Advanced Persistent Threat" is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. "Advanced Persistent Threat" covers what you need to know including: How and why organizations are being attacked; how to develop a "Risk based Approach to Security"; tools for protecting data and preventing attacks; critical information on how to respond and recover from an intrusion; and the emerging threat to Cloud based networks. |
Physical Description: | 1 Online-Ressource (xvi, 290 Seiten) |
ISBN: | 1597499552 9781597499552 9781597499491 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047648376 | ||
003 | DE-627-1 | ||
005 | 20240228115120.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2013 xx |||||o 00| ||eng c | ||
020 | |a 1597499552 |9 1-59749-955-2 | ||
020 | |a 9781597499552 |9 978-1-59749-955-2 | ||
020 | |a 9781597499491 |9 978-1-59749-949-1 | ||
035 | |a (DE-627-1)047648376 | ||
035 | |a (DE-599)KEP047648376 | ||
035 | |a (ORHE)9781597499491 | ||
035 | |a (DE-627-1)047648376 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Cole, Eric |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Advanced persistent threat |b understanding the danger and how to protect your organization |c Eric Cole |
264 | 1 | |a Boston |b Syngress |c 2013 | |
300 | |a 1 Online-Ressource (xvi, 290 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In "Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization", Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. "Advanced Persistent Threat" is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. "Advanced Persistent Threat" covers what you need to know including: How and why organizations are being attacked; how to develop a "Risk based Approach to Security"; tools for protecting data and preventing attacks; critical information on how to respond and recover from an intrusion; and the emerging threat to Cloud based networks. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer networks |x Access control | |
650 | 0 | |a Internet |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Internet ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Access control | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Internet ; Security measures | |
776 | 1 | |z 9781597499491 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597499491 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597499491/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047648376 |
---|---|
_version_ | 1829007776631750658 |
adam_text | |
any_adam_object | |
author | Cole, Eric |
author_facet | Cole, Eric |
author_role | aut |
author_sort | Cole, Eric |
author_variant | e c ec |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047648376 (DE-599)KEP047648376 (ORHE)9781597499491 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02865cam a22004692c 4500</leader><controlfield tag="001">ZDB-30-ORH-047648376</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115120.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499552</subfield><subfield code="9">1-59749-955-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499552</subfield><subfield code="9">978-1-59749-955-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499491</subfield><subfield code="9">978-1-59749-949-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648376</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047648376</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597499491</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648376</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cole, Eric</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced persistent threat</subfield><subfield code="b">understanding the danger and how to protect your organization</subfield><subfield code="c">Eric Cole</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Syngress</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 290 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In "Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization", Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. "Advanced Persistent Threat" is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. "Advanced Persistent Threat" covers what you need to know including: How and why organizations are being attacked; how to develop a "Risk based Approach to Security"; tools for protecting data and preventing attacks; critical information on how to respond and recover from an intrusion; and the emerging threat to Cloud based networks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597499491</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597499491</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597499491/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047648376 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:41Z |
institution | BVB |
isbn | 1597499552 9781597499552 9781597499491 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xvi, 290 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Syngress |
record_format | marc |
spelling | Cole, Eric VerfasserIn aut Advanced persistent threat understanding the danger and how to protect your organization Eric Cole Boston Syngress 2013 1 Online-Ressource (xvi, 290 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In "Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization", Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. "Advanced Persistent Threat" is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. "Advanced Persistent Threat" covers what you need to know including: How and why organizations are being attacked; how to develop a "Risk based Approach to Security"; tools for protecting data and preventing attacks; critical information on how to respond and recover from an intrusion; and the emerging threat to Cloud based networks. Computer networks Security measures Computer networks Access control Internet Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Computer networks ; Access control Computer networks ; Security measures Internet ; Security measures 9781597499491 Erscheint auch als Druck-Ausgabe 9781597499491 |
spellingShingle | Cole, Eric Advanced persistent threat understanding the danger and how to protect your organization Computer networks Security measures Computer networks Access control Internet Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Computer networks ; Access control Computer networks ; Security measures Internet ; Security measures |
title | Advanced persistent threat understanding the danger and how to protect your organization |
title_auth | Advanced persistent threat understanding the danger and how to protect your organization |
title_exact_search | Advanced persistent threat understanding the danger and how to protect your organization |
title_full | Advanced persistent threat understanding the danger and how to protect your organization Eric Cole |
title_fullStr | Advanced persistent threat understanding the danger and how to protect your organization Eric Cole |
title_full_unstemmed | Advanced persistent threat understanding the danger and how to protect your organization Eric Cole |
title_short | Advanced persistent threat |
title_sort | advanced persistent threat understanding the danger and how to protect your organization |
title_sub | understanding the danger and how to protect your organization |
topic | Computer networks Security measures Computer networks Access control Internet Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Computer networks ; Access control Computer networks ; Security measures Internet ; Security measures |
topic_facet | Computer networks Security measures Computer networks Access control Internet Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Computer networks ; Access control Computer networks ; Security measures Internet ; Security measures |
work_keys_str_mv | AT coleeric advancedpersistentthreatunderstandingthedangerandhowtoprotectyourorganization |