Enterprise Security : a Data-Centric Approach to Securing the Enterprise.
A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Pub.,
2013.
©2013 |
Temas: | |
Acceso en línea: | Texto completo |
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | KNOVEL_ocn830169898 | ||
003 | OCoLC | ||
005 | 20231027140348.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 130316s2013 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d OCLCQ |d YDXCP |d N$T |d UMI |d IDEBK |d KNOVL |d OCLCF |d OCLCQ |d OCLCO |d KNOVL |d DEBSZ |d OCLCQ |d FEM |d JBG |d AGLDB |d MERUC |d OCLCQ |d ZCU |d OCLCA |d CEF |d ICG |d VTS |d OCLCQ |d STF |d DKC |d OCLCQ |d OCLCO |d OCL |d OCLCQ |d OCLCO | ||
019 | |a 830536582 |a 968046733 |a 969047623 | ||
020 | |a 9781849685979 |q (electronic bk.) | ||
020 | |a 1849685975 |q (electronic bk.) | ||
020 | |a 9781621989165 |q (electronic bk.) | ||
020 | |a 162198916X |q (electronic bk.) | ||
020 | |z 9781849685962 | ||
029 | 1 | |a AU@ |b 000050768389 | |
029 | 1 | |a AU@ |b 000062539116 | |
029 | 1 | |a CHNEW |b 001051225 | |
029 | 1 | |a CHVBK |b 567700453 | |
029 | 1 | |a DEBBG |b BV042965316 | |
029 | 1 | |a DEBBG |b BV044171692 | |
029 | 1 | |a DEBSZ |b 42373766X | |
029 | 1 | |a DEBSZ |b 431291322 | |
029 | 1 | |a AU@ |b 000067111504 | |
029 | 1 | |a DKDLA |b 820120-katalog:999930680405765 | |
035 | |a (OCoLC)830169898 |z (OCoLC)830536582 |z (OCoLC)968046733 |z (OCoLC)969047623 | ||
037 | |a CL0500000220 |b Safari Books Online | ||
050 | 4 | |a TK5103.4885 .W384 2013 | |
072 | 7 | |a COM |x 060030 |2 bisacsh | |
072 | 7 | |a COM |x 060080 |2 bisacsh | |
082 | 0 | 4 | |a 004.678 |
049 | |a UAMI | ||
100 | 1 | |a Woody, Aaron. | |
245 | 1 | 0 | |a Enterprise Security : |b a Data-Centric Approach to Securing the Enterprise. |
260 | |a Birmingham : |b Packt Pub., |c 2013. | ||
264 | 4 | |c ©2013 | |
300 | |a 1 online resource (324 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |2 rda | ||
505 | 0 | |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.packtpub.com; Table of Contents; Preface; Chapter 1: Enterprise Security Overview; The façade of enterprise security; The history and making of the façade; Our current approach to security; Security architecture 101; A new approach to security; Enterprise security pitfalls; Shortcomings of the current security architecture; Communicating information security; The cost of information security; The conflicting message of enterprise security; Proving a negative; The road map to securing the enterprise; Road map components. | |
505 | 8 | |a Defining usersDefining applications; Defining data; Defining roles; Defining processes; Defining policies and standards; Defining network infrastructure; Defining application security architecture; Summary; Chapter 2: Security Architectures; Redefining the network edge; Drivers for redefinition; Feature-rich web applications; Business partner access; Miscellaneous third-party services; Cloud initiatives; Security architecture models; Defining the building blocks of trust models; Defining data in a trust model; Defining processes in a trust model; Defining applications in a trust model. | |
505 | 8 | |a Defining users in a trust modelDefining roles in a trust model; Defining policies and standards; Enterprise trust models; Application user (external); Application owner (business partner); System owner (contractor); Data owner (internal); Automation; Micro architectures; Data risk-centric architectures; BYOD initiatives; Bring your own mobile device; Bring your own PC; Summary; Chapter 3: Security As a Process; Risk analysis; What is risk analysis?; Assessing threats; Assessing impact; Assessing probability; Assessing risk; Applying risk analysis to trust models. | |
505 | 8 | |a Deciding on a risk analysis methodologyOther thoughts on risk and new enterprise endeavors; Security policies and standards; Policy versus standard; A quick note on wording; Understanding security policy development; Common IT security policies; Information security policy; Acceptable use policy; Technology use policy; Remote access policy; Data classification policy; Data handling policy; Data retention policy; Data destruction policy; Policies for emerging technologies; Policy considerations; Emerging technology challenges; Developing enterprise security standards. | |
505 | 8 | |a Common IT security standardsSecurity exceptions; Security review of changes; Perimeter security changes; Data access changes; Network architectural changes; Summary; Chapter 4: Securing the Network; Overview; Next generation firewalls; Benefits of NGFW technology; Application awareness; Intrusion prevention; Advanced malware mitigation; Intrusion detection and prevention; Intrusion detection; Intrusion prevention; Detection methods; Behavioral analysis; Anomaly detection; Signature-based detection; Advanced persistent threat detection and mitigation; Securing network services; DNS. | |
500 | |a DNS resolution. | ||
520 | |a A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise. | ||
588 | 0 | |a Print version record. | |
590 | |a Knovel |b ACADEMIC - Software Engineering | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer architecture. | |
650 | 0 | |a Business |x Data processing. | |
650 | 0 | |a Management |x Data processing. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Ordinateurs |x Architecture. | |
650 | 6 | |a Gestion |x Informatique. | |
650 | 7 | |a COMPUTERS |x Networking |x Intranets & Extranets. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Web |x General. |2 bisacsh | |
650 | 7 | |a Management |x Data processing |2 fast | |
650 | 7 | |a Business |x Data processing |2 fast | |
650 | 7 | |a Computer architecture |2 fast | |
650 | 7 | |a Computer security |2 fast | |
776 | 0 | 8 | |i Print version: |a Woody, Aaron. |t Enterprise Security : A Data-Centric Approach to Securing the Enterprise. |d Birmingham : Packt Publishing, ©2013 |z 9781849685962 |
856 | 4 | 0 | |u https://appknovel.uam.elogim.com/kn/resources/kpESADCAS1/toc |z Texto completo |
938 | |a EBL - Ebook Library |b EBLB |n EBL1103988 | ||
938 | |a EBSCOhost |b EBSC |n 548265 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis24881043 | ||
938 | |a YBP Library Services |b YANK |n 10314229 | ||
994 | |a 92 |b IZTAP |