Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

3,5 durchschnittliche Bewertung
( 4 Bewertungen bei Goodreads )
 
9781118896693: Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges
Reseña del editor:

Similar to unraveling a math word problem, Security Intelligence: A Practitioner s Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. You will learn about: * Secure proxies the necessary extension of the endpoints * Application identification and control visualize the threats * Malnets where is the source of infection and who are the pathogens * Identify the security breach who was the victim and what was the lure * Security in Mobile computing SNAFU

With this book, you will be able to: * Identify the relevant solutions to secure the infrastructure * Construct policies that provide flexibility to the users so to ensure productivity * Deploy effective defenses against the ever evolving web threats * Implement solutions that are compliant to relevant rules and regulations * Offer insight to developers who are building new security solutions and products

Reseña del editor:

Similar to unraveling a math word problem, this book guides the reader through a deciphering process that translates each security goal into a set of security variables, substitutes each variable into a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle.Secure proxies - The necessary man-in-the-middleApplication identification and control - Visualize the threatsMalnets - Where is the source of infection and who are the pathogensIdentify the security breach - Who was the victim and what was the lureSecurity in Mobile computing - SNAFUWith this book, the reader will be able to: secure the infrastructureprovide flexibility to the users so to ensure productivitydefend against the ever evolving web threatsimplement solutions that are compliant to relevant rules and regulationsdevelop new security solutions and products

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.

(Keine Angebote verfügbar)

Buch Finden:



Kaufgesuch aufgeben

Sie kennen Autor und Titel des Buches und finden es trotzdem nicht auf ZVAB? Dann geben Sie einen Suchauftrag auf und wir informieren Sie automatisch, sobald das Buch verfügbar ist!

Kaufgesuch aufgeben