000 02584cam a2200457Ii 4500
020 _a9781119183440
_qelectronic bk.
020 _a1119183448
_qelectronic bk.
020 _a9781118987087
_qelectronic bk.
020 _a111898708X
_qelectronic bk.
020 _z9781118987124
020 _a9781118987230
020 _a1118987233
020 _a1118987128
020 _a9781118987124
040 _cCUS
072 7 _aBUS
_x082000
_2bisacsh
072 7 _aBUS
_x041000
_2bisacsh
072 7 _aBUS
_x042000
_2bisacsh
072 7 _aBUS
_x085000
_2bisacsh
100 1 _aMonte, Matthew,
_eauthor.
245 1 0 _aNetwork attacks and exploitation :
_ba framework /
_cMatthew Monte.
246 3 _aNetwork attacks & exploitation
260 1 _aIndianapolis, IN :
_bWiley,
_c2015.
260 4 _c©2015
300 _a1 online resource.
505 0 _aComputer Network Exploitation -- The Attacker -- The Defender -- Asymmetries -- Attacker Frictions -- Defender Frictions -- Offensive Strategy -- Defensive Strategy -- Offensive Case Studies.
520 _aThis book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. --
_cEdited summary from book.
650 0 _aBusiness enterprises
_xComputer networks
_xSecurity measures.
650 0 _aComputer security.
650 0 _aComputer crimes
_xPrevention.
650 0 _aCorporations
_xSecurity measures.
650 7 _aBUSINESS & ECONOMICS / Industrial Management
_2bisacsh
650 7 _aBUSINESS & ECONOMICS / Management
_2bisacsh
650 7 _aBUSINESS & ECONOMICS / Management Science
_2bisacsh
650 7 _aBUSINESS & ECONOMICS / Organizational Behavior
_2bisacsh
650 7 _aBusiness enterprises
_xComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00842535
650 7 _aComputer crimes
_xPrevention.
_2fast
_0(OCoLC)fst00872068
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
650 7 _aCorporations
_xSecurity measures.
_2fast
_0(OCoLC)fst00879928
856 4 0 _uhttps://doi.org/10.1002/9781119183440
_zWiley Online Library
942 _cEBK
999 _c208650
_d208650