Cargando…

Security intelligence : a practitioner's guide to solving enterprise security challenges /

Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally acro...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Li, Qing, 1971- (Autor), Clark, Gregory (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Wiley, 2015.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn906699046
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu|||unuuu
008 150407s2015 inu ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d IDEBK  |d E7B  |d CDX  |d YDXCP  |d EBLCP  |d OCLCF  |d UMI  |d DG1  |d COO  |d RECBK  |d DEBSZ  |d OCLCQ  |d DEBBG  |d KSU  |d K6U  |d IDB  |d COCUF  |d DG1  |d S4S  |d CCO  |d LIP  |d PIFFA  |d FVL  |d ZCU  |d OCLCQ  |d MERUC  |d OCLCQ  |d SAKAP  |d U3W  |d OCLCA  |d OCLCQ  |d STF  |d ICG  |d INT  |d VT2  |d OCLCQ  |d WYU  |d TKN  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d UKAHL  |d OCLCQ  |d UKSSU  |d TUHNV  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d OCLCQ 
016 7 |a 017372097  |2 Uk 
019 |a 908080285  |a 914287647  |a 961627624  |a 962627152  |a 981865306  |a 989213767  |a 1010606339  |a 1055359930  |a 1066650191  |a 1081220383  |a 1138976882 
020 |a 9781118896679  |q (electronic bk.) 
020 |a 111889667X  |q (electronic bk.) 
020 |a 9781118896662  |q (electronic bk.) 
020 |a 1118896661  |q (electronic bk.) 
020 |a 9781119183617  |q (electronic bk.) 
020 |a 1119183618  |q (electronic bk.) 
020 |a 1118896696 
020 |a 9781118896693 
020 |z 9781118896693 
029 1 |a AU@  |b 000054954842 
029 1 |a AU@  |b 000060217161 
029 1 |a DEBBG  |b BV043397685 
029 1 |a DEBBG  |b BV043615808 
029 1 |a DEBSZ  |b 452647193 
029 1 |a DEBSZ  |b 453328733 
029 1 |a DEBSZ  |b 468874828 
029 1 |a DKDLA  |b 820120-katalog:999925482205765 
035 |a (OCoLC)906699046  |z (OCoLC)908080285  |z (OCoLC)914287647  |z (OCoLC)961627624  |z (OCoLC)962627152  |z (OCoLC)981865306  |z (OCoLC)989213767  |z (OCoLC)1010606339  |z (OCoLC)1055359930  |z (OCoLC)1066650191  |z (OCoLC)1081220383  |z (OCoLC)1138976882 
037 |a CL0500000619  |b Safari Books Online 
050 4 |a TK5105.59 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Li, Qing,  |d 1971-  |e author.  |1 https://id.oclc.org/worldcat/entity/E39PCjBkFMhVVxyVY7gkBVQkTb 
245 1 0 |a Security intelligence :  |b a practitioner's guide to solving enterprise security challenges /  |c Qing Li, Gregory Clark. 
264 1 |a Indianapolis, IN :  |b Wiley,  |c 2015. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from PDF title page (Ebsco, viewed April 13, 2015). 
504 |a Includes bibliographical references and index. 
505 0 |a Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges; Contents; Foreword; Preface; Chapter 1 Fundamentals of Secure Proxies; Security Must Protect and Empower Users; The Birth of Shadow IT; Internet of Things and Connected Consumer Appliances; Conventional Security Solutions; Traditional Firewalls: What Are Their Main Deficiencies?; Firewall with DPI: A Better Solution?; IDS/IPS and Firewall; Unified Threat Management and Next-Generation Firewall; Security Proxy-A Necessary Extension of the End Point; Transaction-Based Processing; The Proxy Architecture. 
505 8 |a SSL Proxy and InterceptionInterception Strategies; Certificates and Keys; Certificate Pinning and OCSP Stapling; SSL Interception and Privacy; Summary; Chapter 2 Proxy Deployment Strategies and Challenges; Definitions of Proxy Types: Transparent Proxy and Explicit Proxy; Inline Deployment of Transparent Proxy: Physical Inline and Virtual Inline; Physical Inline Deployment; Virtual Inline Deployment; Traffic Redirection Methods: WCCP and PBR; LAN Port and WAN Port; Forward Proxy and Reverse Proxy; Challenges of Transparent Interception; Directionality of Connections; Maintaining Traffic Paths. 
505 8 |a Avoiding InterceptionAsymmetric Traffic Flow Detection and Clustering; Proxy Chaining; Summary; Chapter 3 Proxy Policy Engine and Policy Enforcements; Policy System Overview; Conditions and Properties; Policy Transaction; Policy Ticket; Policy Updates and Versioning System; Security Implications; Policy System in the Cloud Security Operation; Policy Evaluation; Policy Checkpoint; Policy Execution Timing; Revisiting the Proxy Interception Steps; Enforcing External Policy Decisions; Summary; Chapter 4 Malware and Malware Delivery Networks; Cyber Warfare and Targeted Attacks. 
505 8 |a Espionage and Sabotage in CyberspaceIndustrial Espionage; Operation Aurora; Watering Hole Attack; Breaching the Trusted Third Party; Casting the Lures; Spear Phishing; Pharming; Cross-Site Scripting; Search Engine Poisoning; Drive-by Downloads and the Invisible iframe; Tangled Malvertising Networks; Malware Delivery Networks; Fast-Flux Networks; Explosion of Domain Names; Abandoned Sites and Domain Names; Antivirus Software and End-Point Solutions -- The Losing Battle; Summary; Chapter 5 Malnet Detection Techniques; Automated URL Reputation System; Creating URL Training Sets. 
505 8 |a Extracting URL Feature SetsClassifier Training; Dynamic Webpage Content Rating; Keyword Extraction for Category Construction; Keyword Categorization; Detecting Malicious Web Infrastructure; Detecting Exploit Servers through Content Analysis; Topology-Based Detection of Dedicated Malicious Hosts; Detecting C2 Servers; Detection Based on Download Similarities; Crawlers; Detecting Malicious Servers with a Honeyclient; High Interaction versus Low Interaction; Capture-HPC: A High-Interaction Honeyclient; Thug: A Low-Interaction Honeyclient; Evading Honeyclients; Summary; Chapter 6 Writing Policies. 
520 |a Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Electronic information resources  |x Access control. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Sources d'information électroniques  |x Accès  |x Contrôle. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Electronic information resources  |x Access control  |2 fast 
650 7 |a Computers and IT.  |2 ukslc 
700 1 |a Clark, Gregory,  |e author. 
758 |i has work:  |a Security intelligence (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFtfrbtDXF8KHR3jyPbJ9P  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Li, Qing.  |t Security Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges.  |d Hoboken : Wiley, ©2015  |z 9781118896693 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1895130  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH27099085 
938 |a Askews and Holts Library Services  |b ASKH  |n AH27099016 
938 |a Coutts Information Services  |b COUT  |n 29819340 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4444811 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1895130 
938 |a ebrary  |b EBRY  |n ebr11041436 
938 |a EBSCOhost  |b EBSC  |n 975603 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis29819340 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00624003 
938 |a YBP Library Services  |b YANK  |n 12599004 
938 |a YBP Library Services  |b YANK  |n 12367766 
938 |a YBP Library Services  |b YANK  |n 12673572 
994 |a 92  |b IZTAP