Críticas:
"This book should help any developer, researcher, designer, architect, and even strategist to develop not just solutions, but good solutions, in this dense and evolving area...It could be used as a foundation to certify newcomers to the (security) field and will challenge (professionals) on a horizon of skills beyond security, networking, software design, and system architecture." Arnaud Taddei, Director of Security Solutions Architecture, Symantec "I was looking forward to reading Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges as a way to learn about the Symantec Blue Coat Security Proxy in support of my work at Symantec. However, I was soon pleased to discover that the book is much more than that. While the coverage of security proxies is indeed comprehensive, the book more broadly takes on the task of guiding the reader to an understanding of network security as a whole... The book is clearly written in an approachable conversational style that is careful not to slip into undefined jargon or assume specialized background of the reader, making it an excellent entree to what is sometimes an inaccessible field." Michael Spertus, Symantec Fellow at Symantec and Adjunct Professor, University of Chicago
Reseña del editor:
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. You will learn about: * Secure proxies the necessary extension of the endpoints * Application identification and control visualize the threats * Malnets where is the source of infection and who are the pathogens * Identify the security breach who was the victim and what was the lure * Security in Mobile computing SNAFU With this book, you will be able to: * Identify the relevant solutions to secure the infrastructure * Construct policies that provide flexibility to the users so to ensure productivity * Deploy effective defenses against the ever evolving web threats * Implement solutions that are compliant to relevant rules and regulations * Offer insight to developers who are building new security solutions and products
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.