Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Paperback. Condition: new. New Copy. Customer Service Guaranteed.
Condition: As New. Unread book in perfect condition.
Condition: New.
Seller: Chiron Media, Wallingford, United Kingdom
£ 32.23
Quantity: Over 20 available
Add to basketPaperback. Condition: New.
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
£ 41.50
Quantity: Over 20 available
Add to basketPaperback / softback. Condition: New. New copy - Usually dispatched within 4 working days.
Condition: New. In.
Seller: Chiron Media, Wallingford, United Kingdom
Paperback. Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Taschenbuch. Condition: Neu. Advanced Persistent Security | A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies | Ira Winkler (u. a.) | Taschenbuch | Einband - flex.(Paperback) | Englisch | 2016 | Syngress | EAN 9780128093160 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu.
Condition: new. Questo è un articolo print on demand.
Paperback. Condition: Brand New. 1st edition. 260 pages. 9.00x7.25x0.75 inches. In Stock. This item is printed on demand.
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
£ 53.54
Quantity: Over 20 available
Add to basketPaperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.