It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_2016/BooksAll.2016.part39.utf8:224756977:1420
Source Library of Congress
Download Link /show-records/marc_loc_2016/BooksAll.2016.part39.utf8:224756977:1420?format=raw

LEADER: 01420cam a2200301 i 4500
001 2012043183
003 DLC
005 20141204080419.0
008 121203s2013 ne b 001 0 eng
010 $a 2012043183
020 $a9781597499491 (alk. paper)
040 $aDLC$beng$cDLC$erda$dDLC
042 $apcc
050 00 $aQA76.9.A25$bC5966 2013
082 00 $a005.8$223
100 1 $aCole, Eric.
245 10 $aAdvanced persistent threat :$bunderstanding the danger and how to protect your organization /$cDr. Eric Cole.
264 1 $aAmsterdam ;$aBoston :$bSyngress, an imprint of Elsevier,$c2013.
300 $axvi, 290 pages :$billustrations ;$c24 cm
336 $atext$2rdacontent
337 $aunmediated$2rdamedia
338 $avolume$2rdacarrier
504 $aIncludes bibliographical references and index.
505 0 $aThe changing threat -- Why are organizations being compromised -- How are organizations being compromised -- Risk based approach to security -- Protecting your data -- Prevention is ideal but detection is a must -- Respond and recover -- Technologies for success -- The changing landscape: cloud and mobilization -- Proactive security and reputational ranking -- Focusing in on the right security -- Implementing adaptive security.
650 0 $aComputer networks$xSecurity measures.
650 0 $aComputer security.
650 0 $aData protection.
650 0 $aComputer crimes$xPrevention.