Skip to content

Cybercrime and Espionage An Analysis of Subversive Multi-Vector Threats

Best in textbook rentals since 2012!

ISBN-10: 1597496138

ISBN-13: 9781597496131

Edition: 2011

Authors: Will Gragido, John Pirc

List price: $43.99
Blue ribbon 30 day, 100% satisfaction guarantee!

Rental notice: supplementary materials (access codes, CDs, etc.) are not guaranteed with rental orders.

Rent eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $43.99
Copyright year: 2011
Publisher: Elsevier Science & Technology Books
Publication date: 3/7/2011
Binding: Paperback
Pages: 272
Size: 7.50" wide x 9.25" long x 0.75" tall
Weight: 1.232
Language: English

Will Gragido possesses over 18 years of information security experience. A former United States Marine, Mr. Gragido began his career in the data communications information security and intelligence communities. After USMC, Mr. Gragido worked within several information security consultancy roles performing and leading red teaming, penetration testing, incident response, security assessments, ethical hacking, malware analysis and risk management program development. Mr.Gragido has worked with a variety of industry leading research organizations including International Network Services, Internet Security Systems / IBM Internet Security Systems X-Force, Damballa, Cassandra Security, HP DVLabs,…    

John Pirc has more than 15 years of experience in Security R&D, worldwide security product management, marketing, testing, forensics, consulting, and critical infrastructure architecting and deployment. Additionally, John is an advisor to HP's CISO on Cyber Security and lectured at the US Naval Post Graduate School. John extensive expertise in the Security field stems from past work experience with the Central Intelligence Agency in Cyber Security, as Chief Technology Officer at CSG LTD, Product Manager at Cisco, Product Line Executive for all security products at IBM Internet Security Systems, Director at McAfee's Network Defense Business Unit and currently the Director of Product…    

Introduction: Cybercrime and Espionage and the New Security 101
Evolution Revolution: Maturity of Communications Systems and the Emergence of Advanced Web Technology
The Silent Killer: How Regulatory Compliance Has Worsened The State of Information Security
Mediating the Great Divorce: The Convergence of Physical and Logical SecurityNon-State Sponsored: Stealing
Information Is Our Business..and Business Is Good: Asymmetric Forms of Gathering Information
State Sponsored Intelligence Types
Cyber X: Criminal Syndicates, Nation states, Sub-National Entities and Beyond
Rise of the Subversive Multi-Vector Threat
Seven Commonalities of Subversive Multi-Vector Threats
Examples of Compromise and Presence of Subversive Multi-Vector Threats
Hiding in Plain Sight: Next Generation Techniques and Tools for Avoidance and Obfuscation
Weapons of Our Warfare: Next Generation Techniques and Tools for Detection, Identification and Analysis