000353331 000__ 03544cam\a2200433\a\4500 000353331 001__ 353331 000353331 005__ 20210513130330.0 000353331 006__ m\\\\\\\\u\\\\\\\\ 000353331 007__ cr\cn\nnnunnun 000353331 008__ 110818s2011\\\\ne\ad\\\ob\\\\001\0\eng\d 000353331 020__ $$a9781597496148 (electronic bk.) 000353331 020__ $$z9781597496131 000353331 035__ $$a(OCoLC)ocn703272564 000353331 035__ $$a(CaPaEBR)ebr10443324 000353331 035__ $$a353331 000353331 040__ $$aCaPaEBR$$cCaPaEBR 000353331 05014 $$aHV6773$$b.G73 2011eb 000353331 1001_ $$aGragido, Will. 000353331 24510 $$aCybercrime and espionage$$h[electronic resource] :$$ban analysis of subversive multivector threats /$$cWill Gragido, John Pirc ; Russ Rogers, technical editor. 000353331 260__ $$aRockland, Mass. :$$bSyngress ;$$aOxford :$$bElsevier Science [distributor],$$cc2011. 000353331 300__ $$a1 online resource (xv, 254 p.) :$$bill. 000353331 500__ $$aDescription based on print version record. 000353331 504__ $$aIncludes bibliographical references and index. 000353331 5050_ $$aCybercrime and espionage and the new security 101 -- Evolution revolution -- The silent killer : how regulatory compliance has worsened the state of information security -- Mediating the great divorce : the convergence of physical and logical security -- Nonstate sponsored attacks : stealing information is our business, and business is good -- State-sponsored intelligence -- Cyber X : criminal syndicates, nation states, subnational entities, and beyond -- The rise of the subversive multivector threats -- Seven commonalities of subversive multivector threats -- Examples of compromise and presence of subversive multivector threats -- Hiding in plain sight : next-generation techniques and tools for avoidance and obfuscation -- Weapons of our warfare : next-generation techniques and tools for detection, identification, and analysis. 000353331 506__ $$aAccess limited to authorized users. 000353331 520__ $$aThis book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information. Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights. Presents never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them. 000353331 650_0 $$aComputer crimes. 000353331 650_0 $$aEspionage. 000353331 650_0 $$aSecurity systems. 000353331 650_0 $$aComputer crimes$$xPrevention. 000353331 650_0 $$aBusiness intelligence. 000353331 650_0 $$aThreats$$xSafety measures. 000353331 655_0 $$aElectronic books. 000353331 7001_ $$aPirc, John. 000353331 7001_ $$aRogers, Russ. 000353331 77608 $$iPrint version:$$aGragido, Will.$$tCybercrime and espionage.$$dRockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], c2011$$z9781597496131$$w(OCoLC)657600279 000353331 8520_ $$bacq 000353331 85280 $$bebk$$hProquest Ebook Central 000353331 85640 $$3ProQuest Ebook Central$$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=645033$$zOnline Access 000353331 909CO $$ooai:library.usi.edu:353331$$pGLOBAL_SET 000353331 980__ $$aEBOOK 000353331 980__ $$aBIB 000353331 982__ $$aEbook 000353331 983__ $$aOnline