MARC details
000 -LEADER |
fixed length control field |
02944nam a2200241Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250520102719.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781597496131 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV 6773 .G73 2011 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Gragido, Will |
Relator term |
author |
245 #0 - TITLE STATEMENT |
Title |
Cybercrime and espionage : |
Remainder of title |
an analysis of subversive multivector threats / |
Statement of responsibility, etc. |
Will Gragido and John Pirc |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Oxford, United Kingdom : |
Name of publisher, distributor, etc. |
Syngress ; Elsevier Science, Rockland, Mass., |
Date of publication, distribution, etc. |
c2011 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xv, 254 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price amount |
USD13.43 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 1. Cybercrime and espionage and the new security 101 -- Chapter 2. Evolution revolution -- Chapter 3. The silent killer : how regulatory compliance has worsened the state of information security -- Chapter 4. Mediating the great divorce : the convergence of physical and logical security -- Chapter 5. Non-state sponsored attacks : stealing information is our business, and business is good -- Chapter 6. State-sponsored intelligence -- Chapter 7. Cyber X : criminal syndicates, nation states, subnational entities, and beyond -- Chapter 8. The rise of the subversive multivector threats -- Chapter 9. Seven commonalities of subversive multivector threats -- Chapter 10. Examples of compromise and presence of subversive multivector threats -- Chapter 11. Hiding in plain sight : next-generation techniques and tools for avoidance and obfuscation -- Chapter 12. Weapons of our warfare : next-generation techniques and tools for detection, identification, and analysis. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information. Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights. Presents never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER CRIMES |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Pirc, John ;Rogers, Russ |
Relator term |
co-author;editor |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |