000 03182nam a22004337i 4500
999 _c76188
_d76188
005 20230801213950.0
008 180404b2011 xxua|||fr|||| 001 0 eng d
020 _a8781439851234
040 _aCO-UCAC
_beng
_cCO-UCAC
_erda
041 0 _beng
043 _axxu
082 0 4 _222
_a005.8
_c052
100 1 _93472
_aOlson, Ryan
245 1 0 _aCyber security essentials /
_cRyan Olson y otros nueve ; edited by James Graham and Richard Howard
264 1 _aBoca Raton :
_bCRC Press : Taylor & Francis Group,
_c2011.
300 _a325 páginas,
_bilustraciones ;
_c16 x 23 cm.
_f1 ejemplar
336 _2rdacontenido
_aTexto
337 _2rdamedio
_aNo mediado
338 _2rdasoporte
_aVolumen
504 _aIncluye bibliografía
505 _aChapter 1. Cyber security fundamentals. Chapter 2. Attacker techniques and motivations. Chapter 3. Exploitation. Chapter 4. Malicious code. Chapter 5. Defense and analysis techniques. Chapter 6. iDefense special file investigation tools.
506 _aSistemas
520 3 _aThe sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.
520 3 _aTo accomplish this, the team of security professionals from VeriSign’s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book:
520 3 _a• Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors • Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding • Supplies actionable advice for the mitigation of threats • Breaks down the code used to write exploits into understandable diagrams
520 3 _aThis book is not about the latest attack trends or botnets. It’s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.
650 0 7 _2Armarc
_aSEGURIDAD EN COMPUTADORES
_9241028
650 0 7 _2Armarc
_aPROTECCIÓN DE DATOS
_93474
700 1 _aLigh, Michael
_eautor
_93475
700 1 _aSinclair, Greg
_eautor
_93476
700 1 _aHartstein, Blake
_eautor
_93477
700 1 _aSudusinghe, Shahan
_eautor
_93478
700 1 _aGary, Jon
_eautor
_93479
700 1 _aFalcone, Robert
_eautor
_93480
700 1 _aMata, Aldrich da
_eautor
_93481
700 1 _aSmith, Ryan
_eautor
_93482
700 1 _aLawrence, Arion
_eautor
_93483
942 _2ddc
_cBK