Cargando…

Preventing good people from doing bad things : implementing least privilege /

In today's turbulent technological environment, it's becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fai...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mutch, John
Otros Autores: Anderson, Brian
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Berkeley, Calif.] : Apress, ©2011.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn769755403
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 111229s2011 caua ob 001 0 eng d
010 |a  2012360527 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d E7B  |d COO  |d YDXCP  |d CDX  |d B24X7  |d EBLCP  |d OCLCQ  |d OCLCF  |d DEBSZ  |d BEDGE  |d OCLCA  |d OCLCQ  |d OCL  |d UMI  |d NUI  |d OCLCQ  |d VT2  |d Z5A  |d LIV  |d MERUC  |d ESU  |d IOG  |d N$T  |d OCLCA  |d CEF  |d U3W  |d AU@  |d OCLCQ  |d WYU  |d YOU  |d CNTRU  |d UKAHL  |d OL$  |d OCLCQ  |d C6I  |d DCT  |d ERF  |d UKBTH  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 773205292  |a 857251293  |a 985052719  |a 1005800682  |a 1058123460  |a 1086938621  |a 1103267416  |a 1110810662  |a 1112526638  |a 1129335917  |a 1152978451  |a 1162641651  |a 1192345289  |a 1240528142 
020 |a 9781430239222  |q (electronic bk.) 
020 |a 1430239220  |q (electronic bk.) 
020 |z 9781430239215 
020 |z 1430239212 
024 7 |a 10.1007/978-1-4302-3922-2.  |2 doi 
029 1 |a AU@  |b 000048715801 
029 1 |a AU@  |b 000053278473 
029 1 |a DEBSZ  |b 397270828 
029 1 |a NZ1  |b 14253987 
029 1 |a AU@  |b 000067109994 
029 1 |a DKDLA  |b 820120-katalog:999905658205765 
035 |a (OCoLC)769755403  |z (OCoLC)773205292  |z (OCoLC)857251293  |z (OCoLC)985052719  |z (OCoLC)1005800682  |z (OCoLC)1058123460  |z (OCoLC)1086938621  |z (OCoLC)1103267416  |z (OCoLC)1110810662  |z (OCoLC)1112526638  |z (OCoLC)1129335917  |z (OCoLC)1152978451  |z (OCoLC)1162641651  |z (OCoLC)1192345289  |z (OCoLC)1240528142 
037 |a CL0500000122  |b Safari Books Online 
050 4 |a TK5105.59  |b .M88 2011 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a KJ.  |2 bicssc 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Mutch, John. 
245 1 0 |a Preventing good people from doing bad things :  |b implementing least privilege /  |c John Mutch, Brian Anderson. 
260 |a [Berkeley, Calif.] :  |b Apress,  |c ©2011. 
300 |a 1 online resource (xii, 197 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed November 29, 2017). 
504 |a Includes bibliographical references and index. 
520 |a In today's turbulent technological environment, it's becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into account the weakest link in their implementation: human nature. Despite all other efforts, people can sway from what they should be doing. Preventing Good People from doing Bad Things drives that concept home to business executives, auditors, and IT professionals alike. Instead of going through the step-by-step process of implementation, the book points out the implications of allowing users to run with unlimited administrator rights, discusses the technology and supplementation of Microsoft's Group Policy, and dives into the different environments least privilege affects, such as Unix and Linux servers, and databases. Readers will learn ways to protect virtual environments, how to secure multi-tenancy for the cloud, information about least privilege for applications, and how compliance enters the picture. The book also discusses the cost advantages of preventing good people from doing bad things. Each of the chapters emphasizes the need auditors, business executives, and IT professionals all have for least privilege, and discuss in detail the tensions and solutions it takes to implement this principle. Each chapter includes data from technology analysts including Forrester, Gartner, IDC, and Burton, along with analyst and industry expert quotations. 
505 0 |a Chapter 1: The Only IT Constant Is Change -- Chapter 2: Misuse of Privilege Is the New Corporate Landmine -- Chapter 3: Business Executives, Technologists, and Auditors Need Least Privilege -- Chapter 4: Supplementing Group Policy on Windows Desktops -- Chapter 5: Servers Are the Primary Target for Insiders and Hackers Alike -- Chapter 6: Protecting Virtual Environments from Hypervisor Sabotage -- Chapter 7: Secure Multi-Tenancy for Private, Public, and Hybrid Clouds -- Chapter 8: Applications, Databases, and Desktop Data Need Least Privilege, Too -- Chapter 9: Security Does Not Equal Compliance -- Chapter 10: The Hard and Soft Cost of Apathy -- Chapter 11: Final Thoughts for Least Privilege Best Practices 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Hackers. 
650 0 |a Data protection. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Pirates informatiques. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Informatique.  |2 eclas 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Hackers  |2 fast 
653 |a Computer science 
653 |a Computer Science, general 
700 1 |a Anderson, Brian. 
776 0 8 |i Print version:  |a Mutch, John.  |t Preventing good people from doing bad things.  |d [S.l.] : Apress ; New York : distributed by Springer-Verlag New York, Inc., ©2011  |z 9781430239215 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781430239215/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH28323585 
938 |a Books 24x7  |b B247  |n bks00043819 
938 |a Coutts Information Services  |b COUT  |n 21154345 
938 |a EBL - Ebook Library  |b EBLB  |n EBL883809 
938 |a ebrary  |b EBRY  |n ebr10520186 
938 |a EBSCOhost  |b EBSC  |n 1173501 
938 |a YBP Library Services  |b YANK  |n 7342937 
994 |a 92  |b IZTAP