Amazon cover image
Image from Amazon.com

Cybercrime and espionage : an analysis of subversive multivector threats / Will Gragido and John Pirc

By: Contributor(s): Material type: TextTextPublication details: Oxford, United Kingdom : Syngress ; Elsevier Science, Rockland, Mass., c2011Description: xv, 254 pages : illustrations ; 24 cmISBN:
  • 9781597496131
Subject(s): LOC classification:
  • HV 6773 .G73 2011
Contents:
Chapter 1. Cybercrime and espionage and the new security 101 -- Chapter 2. Evolution revolution -- Chapter 3. The silent killer : how regulatory compliance has worsened the state of information security -- Chapter 4. Mediating the great divorce : the convergence of physical and logical security -- Chapter 5. Non-state sponsored attacks : stealing information is our business, and business is good -- Chapter 6. State-sponsored intelligence -- Chapter 7. Cyber X : criminal syndicates, nation states, subnational entities, and beyond -- Chapter 8. The rise of the subversive multivector threats -- Chapter 9. Seven commonalities of subversive multivector threats -- Chapter 10. Examples of compromise and presence of subversive multivector threats -- Chapter 11. Hiding in plain sight : next-generation techniques and tools for avoidance and obfuscation -- Chapter 12. Weapons of our warfare : next-generation techniques and tools for detection, identification, and analysis.
Summary: Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information. Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights. Presents never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Copy number Status Date due Barcode
Books Books National University - Manila LRC - Graduate Studies General Circulation Gen. Ed. - CCIT GC HV 6773 .G73 2011 c.2 (Browse shelf(Opens below)) c.2 Available NULIB000011349

Includes index.

Chapter 1. Cybercrime and espionage and the new security 101 -- Chapter 2. Evolution revolution -- Chapter 3. The silent killer : how regulatory compliance has worsened the state of information security -- Chapter 4. Mediating the great divorce : the convergence of physical and logical security -- Chapter 5. Non-state sponsored attacks : stealing information is our business, and business is good -- Chapter 6. State-sponsored intelligence -- Chapter 7. Cyber X : criminal syndicates, nation states, subnational entities, and beyond -- Chapter 8. The rise of the subversive multivector threats -- Chapter 9. Seven commonalities of subversive multivector threats -- Chapter 10. Examples of compromise and presence of subversive multivector threats -- Chapter 11. Hiding in plain sight : next-generation techniques and tools for avoidance and obfuscation -- Chapter 12. Weapons of our warfare : next-generation techniques and tools for detection, identification, and analysis.

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information. Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights. Presents never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them.

There are no comments on this title.

to post a comment.