Advanced Persistent Security
36%
off

Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

2.5 (2 ratings by Goodreads)
By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 1 business day
When will my order arrive?

Description

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.

The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
show more

Product details

  • Paperback | 260 pages
  • 191 x 235 x 17.78mm | 570g
  • Rockland, MA, United States
  • English
  • black & white illustrations
  • 0128093161
  • 9780128093160
  • 888,068

Table of contents

Chapter 1. What Is Advanced Persistent Security?

Section 1. Concepts/Foundation

Introduction

Chapter 2. Cyberwarfare Concepts

Chapter 3. What Is Proaction?

Chapter 4. Risk Management

Chapter 5. How to Hack Computers

Chapter 6. Threat

Chapter 7. Adversary Infrastructure

Section 2. Protection

Introduction

Chapter 8. Governance

Chapter 9. Vulnerabilities to Address

Chapter 10. Countermeasures

Chapter 11. Security Culture

Chapter 12. What Is Threat Intelligence?

Section 3. Detection

Introduction

Chapter 13. What Is Detection?

Chapter 14. Detection Deficit Disorder

Chapter 15. The Human Intrusion Detection System

Chapter 16. Kill Chain Analysis

Section 4. Reaction

Introduction

Chapter 17. Setting Reaction Strategy

Chapter 18. Incident Response and Investigations

Section 5. Implementation

Introduction

Chapter 19. Know Yourself

Chapter 20. Know Your Adversaries

Chapter 21. Define Your Strategy

Chapter 22. Determining the Appropriate Countermeasures

Chapter 23. Advanced Persistent Security
show more

Review Text

"...this book couldn't be more topical.it provides those who are tasked to implement an organization's security strategy with an easy-to-follow plan of action to cover - and keep covering - all their bases." -- Help Net Security

"The authors propose methods for more adaptive and comprehensive approaches to information security.For those looking for a methodology to create a more robust information security program, Advanced Persistent Security is a valuable resource." -- RSAConference.com
show more

Review quote

"...this book couldn't be more topical...it provides those who are tasked to implement an organization's security strategy with an easy-to-follow plan of action to cover - and keep covering - all their bases." --Help Net Security

"The authors propose methods for more adaptive and comprehensive approaches to information security...For those looking for a methodology to create a more robust information security program, Advanced Persistent Security is a valuable resource." --RSAConference.com
show more

About Ira Winkler

Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world's most influential security professionals, and has been named a "Modern Day James Bond" by the media. He obtained this status by identifying common trends in the way information and computer systems are compromised. He did this by performing penetration tests, where he physically and technically "broke into" some of the largest companies in the World and investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these penetration tests, as well as assisting organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association. Ira is also author of the riveting, entertaining, and educational book, Spies Among Us. He is also a regular contributor to ComputerWorld.com. Mr. Winkler began his career at the National Security Agency, where he served as an Intelligence and Computer Systems Analyst. He moved onto support other US and overseas government military and intelligence agencies. After leaving government service, he went on to serve as President of the Internet Security Advisors Group and Director of Technology of the National Computer Security Association. He was also on the Graduate and Undergraduate faculties of the Johns Hopkins University and the University of Maryland. Mr. Winkler has also written the book Corporate Espionage, which has been described as the bible of the Information Security field, and the bestselling Through the Eyes of the Enemy. Both books address the threats that companies face protecting their information. He has also written over 100 professional and trade articles. He has been featured and frequently appears on TV on every continent. He has also been featured in magazines and newspapers including Forbes, USA Today, and Wall Street Journal. Araceli Treu Gomes is an Intelligence and Investigations Subject Matter Expert for Dell SecureWorks. She holds certifications in privacy and computer forensics, and serves on several cybersecurity industry boards. Araceli writes for Computerworld and CSO Magazine and is an active speaker at conferences around the world.
show more

Rating details

2 ratings
2.5 out of 5 stars
5 0% (0)
4 0% (0)
3 50% (1)
2 50% (1)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X