Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200625 i 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cnu|||unuuu 
008    230131s2023    enka    ob    001 0 eng d 
019    1377285771 
020    9781804618950|q(electronic bk.) 
020    1804618950|q(electronic bk.) 
029 1  AU@|b000073351718 
035    (OCoLC)1367350753|z(OCoLC)1377285771 
037    9781804613672|bO'Reilly Media 
037    10163046|bIEEE 
040    ORMDA|beng|erda|epn|cORMDA|dEBLCP|dOCLCQ|dOCLCF|dN$T|dNBJ
       |dIEEEE|dOCLCQ|dOCLCO|dOCLCQ 
049    INap 
082 04 005.8 
082 04 005.8|223/eng/20230131 
099    |h[O'Reilly electronic resource] 
100 1  Rains, Tim,|eauthor. 
245 10 Cybersecurity threats, malware trends, and strategies :
       |bdiscover risk mitigation strategies for modern threats 
       to your organization /|cTim Rains ; foreword by Timothy 
       Youngblood.|h[O'Reilly electronic resource] 
250    Second edition. 
264  1 Birmingham, UK :|bPackt Publishing Ltd.,|c2023. 
300    1 online resource (xvi, 555 pages) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
490 1  Expert insight 
504    Includes bibliographical references and index. 
505 0  Chapter 1: Introduction -- Different types of CISOs: "The 
       CISO Spectrum" -- How organizations get initially 
       compromised and the cybersecurity fundamentals -- 
       Unpatched vulnerabilities -- Security misconfigurations --
       Weak, leaked, and stolen credentials -- Social engineering
       -- Insider threats -- Focus on the cybersecurity 
       fundamentals -- Understanding the difference between 
       attackers' motivations and tactics -- Summary -- 
       References -- Chapter 2: What to Know about Threat 
       Intelligence -- What is threat intelligence? 
505 8  Where does CTI data come from? -- Using threat 
       intelligence -- The key to using threat intelligence -- 
       Threat intelligence sharing -- CTI sharing protocols -- 
       Traffic Light Protocol -- STIX and TAXII -- Reasons not to
       share CTI -- How to identify credible cyber threat 
       intelligence -- Data sources -- Time periods -- 
       Recognizing hype -- Predictions about the future -- 
       Vendors' motives -- Summary -- References -- Chapter 3: 
       Using Vulnerability Trends to Reduce Risk and Costs -- 
       Introduction -- Vulnerability Management Primer -- 
       Vulnerability Disclosure Data Sources 
505 8  Industry Vulnerability Disclosure Trends -- Vendor and 
       Product Vulnerability Trends -- Reducing Risk and Costs --
       Measuring Vendor and Product Improvement -- Microsoft 
       Vulnerability Trends -- Oracle Vulnerability Trends -- 
       Google Vulnerability Trends -- Debian Vulnerability Trends
       -- Apple Vulnerability Trends -- Vendor Vulnerability 
       Trend Summary -- Operating System Vulnerability Trends -- 
       Google Android Vulnerability Trends -- Apple iOS 
       Vulnerability Trends -- Mobile Operating System Summary --
       Microsoft Windows 10 Vulnerability Trends -- Apple macOS 
       Vulnerability Trends 
505 8  Desktop Operating System Summary -- Ubuntu Linux 
       Vulnerability Trends -- Linux Kernel Vulnerability Trends 
       -- Microsoft Windows Server 2016 Vulnerability Trends -- 
       Server Operating System Summary -- Web Browser 
       Vulnerability Trends -- Apple Safari Vulnerability Trends 
       -- Google Chrome Vulnerability Trends -- Web Browser 
       Summary -- Vulnerability Improvement Framework Summary -- 
       Vulnerability Management Guidance -- Summary -- References
       -- Chapter 4: The Evolution of Malware -- Introduction -- 
       Why is there so much malware on Windows compared to other 
       platforms? -- Data sources 
505 8  The Malicious Software Removal Tool -- Real-time anti-
       malware tools -- Non-security data sources -- About 
       malware -- How malware infections spread -- Trojans -- 
       Potentially unwanted software -- Exploits and exploit kits
       -- Worms -- Ransomware -- Viruses -- Browser modifiers -- 
       Measuring malware prevalence -- Global Windows malware 
       infection analysis -- Regional Windows malware infection 
       analysis -- The threat landscape in the Middle East and 
       Northern Africa -- 10-year regional report card for the 
       Middle East and Northern Africa -- The threat landscape in
       the European Union and Eastern Europe 
520    Tim Rains is Microsoft's former Global Chief Security 
       Advisor and Amazon Web Services' former Global Security 
       Leader for Worldwide Public Sector. He has spent the last 
       two decades advising private and public sector 
       organizations all over the world on cybersecurity 
       strategies. Cybersecurity Threats, Malware Trends, and 
       Strategies, Second Edition builds upon the success of the 
       first edition that has helped so many aspiring CISOs, and 
       cybersecurity professionals understand and develop 
       effective data-driven cybersecurity strategies for their 
       organizations. In this edition, you'll examine long-term 
       trends in vulnerability disclosures and exploitation, 
       regional differences in malware infections and the socio-
       economic factors that underpin them, and how ransomware 
       evolved from an obscure threat to the most feared threat 
       in cybersecurity. You'll also gain valuable insights into 
       the roles that governments play in cybersecurity, 
       including their role as threat actors, and how to mitigate
       government access to data. The book concludes with a deep 
       dive into modern approaches to cybersecurity using the 
       cloud. By the end of this book, you will have a better 
       understanding of the threat landscape, how to recognize 
       good Cyber Threat Intelligence, and how to measure the 
       effectiveness of your organization's cybersecurity 
       strategy. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Computer security. 
650  0 Cyberterrorism. 
650  0 Malware (Computer software) 
650  6 Sécurité informatique. 
650  6 Cyberterrorisme. 
650  6 Logiciels malveillants. 
650  7 Computer security|2fast 
650  7 Cyberterrorism|2fast 
650  7 Malware (Computer software)|2fast 
655  0 Electronic books. 
700 1  Youngblood, Timothy,|ewriter of foreword. 
830  0 Expert insight. 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781804613672/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    ProQuest Ebook Central|bEBLB|nEBL30347745 
938    EBSCOhost|bEBSC|n3536713 
994    92|bJFN