Nehodí se? Vůbec nevadí! U nás můžete do 30 dní vrátit
S dárkovým poukazem nešlápnete vedle. Obdarovaný si za dárkový poukaz může vybrat cokoliv z naší nabídky.
30 dní na vrácení zboží
The book provides a clear and comprehensive roadmap for developing a complete offensive and defensive strategy to thwart both network attacks (hacking) and network exploitation (espionage).Computer Network Exploitation"Strategic Collection (leaked NSA programs)""Directed Collection (China stealing Patriot Missile designs)""Virtual Computer Network Attack (VCNA) (Russia vs. Estonia, Georgia)"The Attacker"Humanity ""Access ""Targeting Capabilities""Exploitation Expertise""Networking Expertise""Software Development Expertise"The Defender"Network Design""Security Policy""Defensive Life Cycle ""The Helpful Defender"Attacker Frictions"Flawed Attack Tools""Upgrades and Updates"Defender Frictions "Flawed Software and Updates"Offensive Strategy"Program Security""Attacker Liabilities""Program Security Costs"Defensive Strategy"Failed Tactics""Application Whitelisting""Network segmentation and segregation""Web domain whitelisting for all domains""Cloud Based Security"Offensive Case Studies "Stuxnet, Target, ATM thieves, etc.""Defensive strategies to prevent exploitation"