Cybercrime and Espionage : An Analysis of Subversive Multi-Vector Threats

個数:

Cybercrime and Espionage : An Analysis of Subversive Multi-Vector Threats

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 272 p.
  • 言語 ENG
  • 商品コード 9781597496131
  • DDC分類 658.47

Full Description

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, SMTs are real and growing at an alarming pace. This book contains a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. It will educate readers on the realities of advanced, next generation threats, which take form in a variety ways.

This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis.

This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO.

Contents

Chapter 1. Introduction: Cybercrime and Espionage and the New Security 101
Chapter 2. Evolution Revolution: Maturity of Communications Systems and the Emergence of Advanced Web Technology
Chapter 3. The Silent Killer: How Regulatory Compliance Has Worsened The State of Information Security
Chapter 4. Mediating the Great Divorce: The Convergence of Physical and Logical SecurityNon-State Sponsored: Stealing Chapter 5: Information Is Our Business....and Business Is Good: Asymmetric Forms of Gathering Information
Chapter 6: State Sponsored Intelligence Types
Chapter 7: Cyber X: Criminal Syndicates, Nation states, Sub-National Entities and Beyond
Chapter 8: Rise of the Subversive Multi-Vector Threat
Chapter 9: Seven Commonalities of Subversive Multi-Vector Threats
Chapter 10: Examples of Compromise and Presence of Subversive Multi-Vector Threats
Chapter 11: Hiding in Plain Sight: Next Generation Techniques and Tools for Avoidance and Obfuscation
Chapter 12: Weapons of Our Warfare: Next Generation Techniques and Tools for Detection, Identification and Analysis


 

最近チェックした商品