|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn865518821 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
131217s2013 enka o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d E7B
|d OCLCO
|d COO
|d DEBBG
|d DEBSZ
|d CNNAI
|d OCLCQ
|d OCLCF
|d OCLCQ
|d AGLDB
|d OCLCQ
|d U3W
|d OCLCA
|d OCLCQ
|d NLE
|d OCLCQ
|d UKMGB
|d UAB
|d AU@
|d UKAHL
|d HS0
|d OCLCQ
|d OCLCO
|d OCL
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB747735
|2 bnb
|
016 |
7 |
|
|a 018015024
|2 Uk
|
019 |
|
|
|a 841170282
|
020 |
|
|
|a 9781849685979
|q (e-book)
|
020 |
|
|
|a 1849685975
|q (e-book)
|
020 |
|
|
|a 1849685967
|
020 |
|
|
|a 9781849685962
|
020 |
|
|
|z 9781849685962
|
029 |
1 |
|
|a CHNEW
|b 000607900
|
029 |
1 |
|
|a DEBBG
|b BV041777857
|
029 |
1 |
|
|a DEBSZ
|b 404323170
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:000666202
|
029 |
1 |
|
|a GBVCP
|b 882721445
|
029 |
1 |
|
|a NZ1
|b 15492520
|
029 |
1 |
|
|a UKMGB
|b 018015024
|
029 |
1 |
|
|a AU@
|b 000065668236
|
035 |
|
|
|a (OCoLC)865518821
|z (OCoLC)841170282
|
037 |
|
|
|a CL0500000343
|b Safari Books Online
|
050 |
|
4 |
|a TK5103.4885 .W384 2013
|
082 |
0 |
4 |
|a 658.478 W912 2013 [ONLINE]
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Woody, Aaron.
|
245 |
1 |
0 |
|a Enterprise security :
|b a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
|c Aaron Woody.
|
260 |
|
|
|a Birmingham, UK :
|b Packt Pub.,
|c 2013.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from cover (Safari, viewed Dec. 16, 2013).
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewers; www.packtpub.com; Table of Contents; Preface; Chapter 1: Enterprise Security Overview; The façade of enterprise security; The history and making of the façade; Our current approach to security; Security architecture 101; A new approach to security; Enterprise security pitfalls; Shortcomings of the current security architecture; Communicating information security; The cost of information security; The conflicting message of enterprise security; Proving a negative; The road map to securing the enterprise; Road map components
|
505 |
8 |
|
|a Defining usersDefining applications; Defining data; Defining roles; Defining processes; Defining policies and standards; Defining network infrastructure; Defining application security architecture; Summary; Chapter 2: Security Architectures; Redefining the network edge; Drivers for redefinition; Feature-rich web applications; Business partner access; Miscellaneous third-party services; Cloud initiatives; Security architecture models; Defining the building blocks of trust models; Defining data in a trust model; Defining processes in a trust model; Defining applications in a trust model
|
505 |
8 |
|
|a Defining users in a trust modelDefining roles in a trust model; Defining policies and standards; Enterprise trust models; Application user (external); Application owner (business partner); System owner (contractor); Data owner (internal); Automation; Micro architectures; Data risk-centric architectures; BYOD initiatives; Bring your own mobile device; Bring your own PC; Summary; Chapter 3: Security As a Process; Risk analysis; What is risk analysis?; Assessing threats; Assessing impact; Assessing probability; Assessing risk; Applying risk analysis to trust models
|
505 |
8 |
|
|a Deciding on a risk analysis methodologyOther thoughts on risk and new enterprise endeavors; Security policies and standards; Policy versus standard; A quick note on wording; Understanding security policy development; Common IT security policies; Information security policy; Acceptable use policy; Technology use policy; Remote access policy; Data classification policy; Data handling policy; Data retention policy; Data destruction policy; Policies for emerging technologies; Policy considerations; Emerging technology challenges; Developing enterprise security standards
|
505 |
8 |
|
|a Common IT security standardsSecurity exceptions; Security review of changes; Perimeter security changes; Data access changes; Network architectural changes; Summary; Chapter 4: Securing the Network; Overview; Next generation firewalls; Benefits of NGFW technology; Application awareness; Intrusion prevention; Advanced malware mitigation; Intrusion detection and prevention; Intrusion detection; Intrusion prevention; Detection methods; Behavioral analysis; Anomaly detection; Signature-based detection; Advanced persistent threat detection and mitigation; Securing network services; DNS
|
520 |
|
|
|a A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer architecture.
|
650 |
|
0 |
|a Business
|x Data processing.
|
650 |
|
0 |
|a Management
|x Data processing.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Architecture.
|
650 |
|
6 |
|a Gestion
|x Informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Management
|x Data processing
|2 fast
|
650 |
|
7 |
|a Business
|x Data processing
|2 fast
|
650 |
|
7 |
|a Computer architecture
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781849685962/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26850930
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10672332
|
994 |
|
|
|a 92
|b IZTAP
|