Cargando…

Security operations in practice /

Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and develop a highly effec...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sheward, Mike (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Swindon, United Kingdom : BCS, The Chartered Institute for IT, 2020.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 KNOVEL_on1142630119
003 OCoLC
005 20231027140348.0
006 m o d
007 cr cnu|||unuuu
008 200302s2020 enk o 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d OCLCF  |d BCSLD  |d OCLCO  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ  |d UPM  |d OCLCQ  |d OCLCO 
020 |a 9781780175072  |q (electronic bk.) 
020 |a 1780175078  |q (electronic bk.) 
020 |z 9781780175065 
035 |a (OCoLC)1142630119 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Sheward, Mike,  |e author. 
245 1 0 |a Security operations in practice /  |c Mike Sheward. 
264 1 |a Swindon, United Kingdom :  |b BCS, The Chartered Institute for IT,  |c 2020. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed March 03, 2020). 
520 |a Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and develop a highly effective security operations team. This requires more than just purchasing a series of information security tools, plugging them in and hoping for the best. As you will learn, it's about hiring the right people to work together, understanding the business the team is working to protect, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats. 
590 |a Knovel  |b ACADEMIC - Software Engineering 
590 |a Knovel  |b ACADEMIC - Transportation Engineering 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Electronic information resources  |x Access control. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sources d'information électroniques  |x Accès  |x Contrôle. 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Network security.  |2 bicssc 
650 7 |a Business applications.  |2 bicssc 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Electronic information resources  |x Access control  |2 fast 
650 7 |a Computer security.  |2 thema 
650 7 |a Network security.  |2 thema 
650 7 |a Business applications.  |2 thema 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpSOP00001/toc  |z Texto completo 
938 |a BCS, The Chartered Institute for IT  |b BCSL  |n 9781780175072 
938 |a EBSCOhost  |b EBSC  |n 2382022 
994 |a 92  |b IZTAP