Search alternatives:
"elocution" » "relocation"
"execution" » "executive"

1
by Moyo, Siegfried
Published 2022
Wiley
..."This book offers any senior level executive an understanding of the core fundamentals of Cyber...

2
by Hosmer, Chet
Published 2016
Syngress is an imprint of Elsevier

3
by Chelly, Magda Lilia, Tan, Shamane, Trần, Hải
Published 2023
Packt Publishing
...Audience This book is for the C-suite and executives who are not necessarily working...

4
by Chelly, Magda Lilia, Tan, Shamane, Tran, Hai
Published 2022
Packt Publishing Ltd.
...With cyberattacks on the rise, it has become essential for C-suite executives and board members...

5
by Edwards, Jason, Weaver, Griffin
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ... Executives -- Why Business Executives Need to be Involved in Cybersecurity -- Roles and Responsibilities...

6
by Gragido, Will
Published 2013
Syngress/Elsevier
Table of Contents: ... ratio -- Execution -- From Russia with love -- The China factor -- Pawns and mules -- Globalization...

7
by Carvey, Harlan A.
Published 2009
Syngress Pub.
Table of Contents: ... analysis -- Registry analysis -- File analysis -- Executable file analysis -- Rootkits and rootkit...

8
by Ulsch, N. MacDonnell
Published 2014
Wiley
Table of Contents: ... Executive Management Must Take to Reduce Cyber Risk -- Managing the Brand When the Worst Occurs -- Managing...

9
by Gragido, Will
Published 2011
Syngress
... in the execution of advanced attacks, their success from the perspective of exploitation and their presence within...

10
by Oriyano, Sean-Philip
Published 2017
Sybex
Table of Contents: ...Executing an Offline Attack -- Using Nontechnical Methods -- Escalating Privileges -- ch. 9...

11
by Reiber, Lee
Published 2019
McGraw-Hill Education
Table of Contents: ... SOP Creation and Execution -- Creation of a Workflow -- Specialty Mobile Forensic Units -- Forensic...

12
by Liska, Allan, Gallo, Timothy
Published 2016
O'Reilly Media
Table of Contents: ...Don't Allow JavaScript Files to Execute LocallyStop the Initial Callout; Reverse-Engineering...

13
by Reiber, Lee
Published 2016
McGraw-Hill Education
Table of Contents: ... SOP Creation and Execution -- Creation of a Workflow -- Specialty Mobile Forensic Units -- Forensic...

14
Published 2024
John Wiley & Sons, Inc.
Table of Contents: .... Analysis of Malicious executables and detection techniques. Detection and Analysis of Botnet Attacks Using...

15
by Sood, Aditya K.
Published 2014
Syngress
Table of Contents: ... Scripting: Command Execution and Scheduling; 6.2.4 USB Spreading; References; 7 Why Targeted Cyber Attacks...

16
by Mowbray, Thomas J.
Published 2014
John Wiley & Sons
Table of Contents: ...: Executive Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware...

17
by Cox, Dennis W.
Published 2014
Wiley
Table of Contents: ... Cards; 7.3.2 Electronic Money; 7.3.3 Wealth Management; 7.3.4 General Insurers; 7.3.5 Execution-only...

18
by Carvey, Harlan A.
Published 2014
Syngress
Table of Contents: ...; Introduction; Goals; Incident triage; Case Notes; Documenting your analysis; Reporting; Format; Executive...

19
by Cappelli, Dawn
Published 2012
Addison-Wesley
... culture. Most important, it offers actionable recommendations for the entire organization, from executive...

20
by Street, Jayson E.
Published 2010
Syngress/Elsevier
... is completely NEW. Read more about the tactics that you see executed throughout the story in the second half...