Cargando…

Enterprise Security : a Data-Centric Approach to Securing the Enterprise.

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Woody, Aaron
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Pub., 2013.
©2013
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn830169898
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 130316s2013 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d YDXCP  |d N$T  |d UMI  |d IDEBK  |d KNOVL  |d OCLCF  |d OCLCQ  |d OCLCO  |d KNOVL  |d DEBSZ  |d OCLCQ  |d FEM  |d JBG  |d AGLDB  |d MERUC  |d OCLCQ  |d ZCU  |d OCLCA  |d CEF  |d ICG  |d VTS  |d OCLCQ  |d STF  |d DKC  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 830536582  |a 968046733  |a 969047623 
020 |a 9781849685979  |q (electronic bk.) 
020 |a 1849685975  |q (electronic bk.) 
020 |a 9781621989165  |q (electronic bk.) 
020 |a 162198916X  |q (electronic bk.) 
020 |z 9781849685962 
029 1 |a AU@  |b 000050768389 
029 1 |a AU@  |b 000062539116 
029 1 |a CHNEW  |b 001051225 
029 1 |a CHVBK  |b 567700453 
029 1 |a DEBBG  |b BV042965316 
029 1 |a DEBBG  |b BV044171692 
029 1 |a DEBSZ  |b 42373766X 
029 1 |a DEBSZ  |b 431291322 
029 1 |a AU@  |b 000067111504 
035 |a (OCoLC)830169898  |z (OCoLC)830536582  |z (OCoLC)968046733  |z (OCoLC)969047623 
037 |a CL0500000220  |b Safari Books Online 
050 4 |a TK5103.4885 .W384 2013 
072 7 |a COM  |x 060030  |2 bisacsh 
072 7 |a COM  |x 060080  |2 bisacsh 
082 0 4 |a 004.678 
049 |a UAMI 
100 1 |a Woody, Aaron. 
245 1 0 |a Enterprise Security :  |b a Data-Centric Approach to Securing the Enterprise. 
260 |a Birmingham :  |b Packt Pub.,  |c 2013. 
264 4 |c ©2013 
300 |a 1 online resource (324 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.packtpub.com; Table of Contents; Preface; Chapter 1: Enterprise Security Overview; The façade of enterprise security; The history and making of the façade; Our current approach to security; Security architecture 101; A new approach to security; Enterprise security pitfalls; Shortcomings of the current security architecture; Communicating information security; The cost of information security; The conflicting message of enterprise security; Proving a negative; The road map to securing the enterprise; Road map components. 
505 8 |a Defining usersDefining applications; Defining data; Defining roles; Defining processes; Defining policies and standards; Defining network infrastructure; Defining application security architecture; Summary; Chapter 2: Security Architectures; Redefining the network edge; Drivers for redefinition; Feature-rich web applications; Business partner access; Miscellaneous third-party services; Cloud initiatives; Security architecture models; Defining the building blocks of trust models; Defining data in a trust model; Defining processes in a trust model; Defining applications in a trust model. 
505 8 |a Defining users in a trust modelDefining roles in a trust model; Defining policies and standards; Enterprise trust models; Application user (external); Application owner (business partner); System owner (contractor); Data owner (internal); Automation; Micro architectures; Data risk-centric architectures; BYOD initiatives; Bring your own mobile device; Bring your own PC; Summary; Chapter 3: Security As a Process; Risk analysis; What is risk analysis?; Assessing threats; Assessing impact; Assessing probability; Assessing risk; Applying risk analysis to trust models. 
505 8 |a Deciding on a risk analysis methodologyOther thoughts on risk and new enterprise endeavors; Security policies and standards; Policy versus standard; A quick note on wording; Understanding security policy development; Common IT security policies; Information security policy; Acceptable use policy; Technology use policy; Remote access policy; Data classification policy; Data handling policy; Data retention policy; Data destruction policy; Policies for emerging technologies; Policy considerations; Emerging technology challenges; Developing enterprise security standards. 
505 8 |a Common IT security standardsSecurity exceptions; Security review of changes; Perimeter security changes; Data access changes; Network architectural changes; Summary; Chapter 4: Securing the Network; Overview; Next generation firewalls; Benefits of NGFW technology; Application awareness; Intrusion prevention; Advanced malware mitigation; Intrusion detection and prevention; Intrusion detection; Intrusion prevention; Detection methods; Behavioral analysis; Anomaly detection; Signature-based detection; Advanced persistent threat detection and mitigation; Securing network services; DNS. 
500 |a DNS resolution. 
520 |a A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise. 
588 0 |a Print version record. 
590 |a Knovel  |b ACADEMIC - Software Engineering 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 0 |a Computer architecture. 
650 0 |a Business  |x Data processing. 
650 0 |a Management  |x Data processing. 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs  |x Architecture. 
650 6 |a Gestion  |x Informatique. 
650 7 |a COMPUTERS  |x Networking  |x Intranets & Extranets.  |2 bisacsh 
650 7 |a COMPUTERS  |x Web  |x General.  |2 bisacsh 
650 7 |a Management  |x Data processing  |2 fast 
650 7 |a Business  |x Data processing  |2 fast 
650 7 |a Computer architecture  |2 fast 
650 7 |a Computer security  |2 fast 
758 |i has work:  |a Enterprise Security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCY8tQdM77mf9dBHvRYvTBK  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Woody, Aaron.  |t Enterprise Security : A Data-Centric Approach to Securing the Enterprise.  |d Birmingham : Packt Publishing, ©2013  |z 9781849685962 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1103988  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1103988 
938 |a EBSCOhost  |b EBSC  |n 548265 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis24881043 
938 |a YBP Library Services  |b YANK  |n 10314229 
994 |a 92  |b IZTAP