Cyber Security Essentials
A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks--
CHF 100.00
Preise inkl. MwSt. und Versandkosten (Portofrei ab CHF 40.00)
V112:
Lieferbar in ca. 10-20 Arbeitstagen
Produktdetails
Weitere Autoren: Olson, Ryan (Hrsg.) / Howard, Rick (Hrsg.)
- ISBN: 978-1-4398-5123-4
- EAN: 9781439851234
- Produktnummer: 7693689
- Verlag: Taylor and Francis
- Sprache: Englisch
- Erscheinungsjahr: 2010
- Seitenangabe: 342 S.
- Masse: H23.4 cm x B15.6 cm 500 g
- Abbildungen: Farb., s/w. Abb.
- Gewicht: 500
Über den Autor
This book is the direct result of the outstanding efforts of a talented pool of security analysts, editors, business leaders and security professionals, all of whom work for iDefense® Security Intelligence Services; a business unit of VeriSign, Inc.iDefense is an open-source, cyber security intelligence operation that maintains expertise in vulnerability research and alerting, exploit development, malicious code analysis, underground monitoring and international actor attribution. iDefense provides intelligence products to Fortune 1,000 companies and three-letter agencies in various world governments. iDefense also maintains the Security Operations Center for the Financial Sector Information Sharing and Analysis Center (FS-ISAC); one of 17 ISACs mandated by the US government to facilitate information sharing throughout the country's business sectors. iDefense has the industry-unique capability of determining not only the technical details of cyber security threats and events (the what, the when and the where), but because of their international presence, iDefense personnel can ascertain the most likely actors and motivations behind these attacks (the who and the why).For more information, please contact customerservice@idefense.com.
6 weitere Werke von James (Hrsg.) Graham:
Bewertungen
Anmelden