Skip to Content
Advanced Persistent Threat
book

Advanced Persistent Threat

by Eric Cole
December 2012
Intermediate to advanced
320 pages
11h 11m
English
Syngress
Content preview from Advanced Persistent Threat

Index

A

Adaptive security, 34
asset identification and valuation, 268
behavioral analysis, 273274
cloud computing, 274
cost benefit analysis, 271272
critical security controls. See Critical security controls
crypto, 274
damage minimization and control with, 258261
attachments conversion, 259
external users to create internal email, 261
indication of internal/external email, 259
remove all executable content and/or html encoding, 260261
running email client/attachment in virtual machine, 258259
data, 262265
classification, 263
correlation, 273
discovery, 263264
encryption to key management, 274
isolation, 264
prioritization, 262
protection, 265
reduction, 264
endpoint security, 273
final security roadmap, 272
game plan, 265267
data or information, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Security

Advanced Persistent Security

Ira Winkler, Araceli Treu Gomes

Publisher Resources

ISBN: 9781597499491