|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
KNOVEL_on1142630119 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
200302s2020 enk o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d OCLCF
|d BCSLD
|d OCLCO
|d OCLCQ
|d OCLCO
|d K6U
|d OCLCQ
|d UPM
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781780175072
|q (electronic bk.)
|
020 |
|
|
|a 1780175078
|q (electronic bk.)
|
020 |
|
|
|z 9781780175065
|
035 |
|
|
|a (OCoLC)1142630119
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sheward, Mike,
|e author.
|
245 |
1 |
0 |
|a Security operations in practice /
|c Mike Sheward.
|
264 |
|
1 |
|a Swindon, United Kingdom :
|b BCS, The Chartered Institute for IT,
|c 2020.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed March 03, 2020).
|
520 |
|
|
|a Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and develop a highly effective security operations team. This requires more than just purchasing a series of information security tools, plugging them in and hoping for the best. As you will learn, it's about hiring the right people to work together, understanding the business the team is working to protect, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats.
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
590 |
|
|
|a Knovel
|b ACADEMIC - Transportation Engineering
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Electronic information resources
|x Access control.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sources d'information électroniques
|x Accès
|x Contrôle.
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Network security.
|2 bicssc
|
650 |
|
7 |
|a Business applications.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Electronic information resources
|x Access control
|2 fast
|
650 |
|
7 |
|a Computer security.
|2 thema
|
650 |
|
7 |
|a Network security.
|2 thema
|
650 |
|
7 |
|a Business applications.
|2 thema
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpSOP00001/toc
|z Texto completo
|
938 |
|
|
|a BCS, The Chartered Institute for IT
|b BCSL
|n 9781780175072
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2382022
|
994 |
|
|
|a 92
|b IZTAP
|