Cargando…

Enterprise security : a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Woody, Aaron
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Pub., 2013.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn865518821
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 131217s2013 enka o 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d E7B  |d OCLCO  |d COO  |d DEBBG  |d DEBSZ  |d CNNAI  |d OCLCQ  |d OCLCF  |d OCLCQ  |d AGLDB  |d OCLCQ  |d U3W  |d OCLCA  |d OCLCQ  |d NLE  |d OCLCQ  |d UKMGB  |d UAB  |d AU@  |d UKAHL  |d HS0  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCQ  |d OCLCO 
015 |a GBB747735  |2 bnb 
016 7 |a 018015024  |2 Uk 
019 |a 841170282 
020 |a 9781849685979  |q (e-book) 
020 |a 1849685975  |q (e-book) 
020 |a 1849685967 
020 |a 9781849685962 
020 |z 9781849685962 
029 1 |a CHNEW  |b 000607900 
029 1 |a DEBBG  |b BV041777857 
029 1 |a DEBSZ  |b 404323170 
029 1 |a DKDLA  |b 820120-katalog:000666202 
029 1 |a GBVCP  |b 882721445 
029 1 |a NZ1  |b 15492520 
029 1 |a UKMGB  |b 018015024 
029 1 |a AU@  |b 000065668236 
035 |a (OCoLC)865518821  |z (OCoLC)841170282 
037 |a CL0500000343  |b Safari Books Online 
050 4 |a TK5103.4885 .W384 2013 
082 0 4 |a 658.478 W912 2013 [ONLINE] 
049 |a UAMI 
100 1 |a Woody, Aaron. 
245 1 0 |a Enterprise security :  |b a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /  |c Aaron Woody. 
260 |a Birmingham, UK :  |b Packt Pub.,  |c 2013. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from cover (Safari, viewed Dec. 16, 2013). 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.packtpub.com; Table of Contents; Preface; Chapter 1: Enterprise Security Overview; The façade of enterprise security; The history and making of the façade; Our current approach to security; Security architecture 101; A new approach to security; Enterprise security pitfalls; Shortcomings of the current security architecture; Communicating information security; The cost of information security; The conflicting message of enterprise security; Proving a negative; The road map to securing the enterprise; Road map components 
505 8 |a Defining usersDefining applications; Defining data; Defining roles; Defining processes; Defining policies and standards; Defining network infrastructure; Defining application security architecture; Summary; Chapter 2: Security Architectures; Redefining the network edge; Drivers for redefinition; Feature-rich web applications; Business partner access; Miscellaneous third-party services; Cloud initiatives; Security architecture models; Defining the building blocks of trust models; Defining data in a trust model; Defining processes in a trust model; Defining applications in a trust model 
505 8 |a Defining users in a trust modelDefining roles in a trust model; Defining policies and standards; Enterprise trust models; Application user (external); Application owner (business partner); System owner (contractor); Data owner (internal); Automation; Micro architectures; Data risk-centric architectures; BYOD initiatives; Bring your own mobile device; Bring your own PC; Summary; Chapter 3: Security As a Process; Risk analysis; What is risk analysis?; Assessing threats; Assessing impact; Assessing probability; Assessing risk; Applying risk analysis to trust models 
505 8 |a Deciding on a risk analysis methodologyOther thoughts on risk and new enterprise endeavors; Security policies and standards; Policy versus standard; A quick note on wording; Understanding security policy development; Common IT security policies; Information security policy; Acceptable use policy; Technology use policy; Remote access policy; Data classification policy; Data handling policy; Data retention policy; Data destruction policy; Policies for emerging technologies; Policy considerations; Emerging technology challenges; Developing enterprise security standards 
505 8 |a Common IT security standardsSecurity exceptions; Security review of changes; Perimeter security changes; Data access changes; Network architectural changes; Summary; Chapter 4: Securing the Network; Overview; Next generation firewalls; Benefits of NGFW technology; Application awareness; Intrusion prevention; Advanced malware mitigation; Intrusion detection and prevention; Intrusion detection; Intrusion prevention; Detection methods; Behavioral analysis; Anomaly detection; Signature-based detection; Advanced persistent threat detection and mitigation; Securing network services; DNS 
520 |a A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer architecture. 
650 0 |a Business  |x Data processing. 
650 0 |a Management  |x Data processing. 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs  |x Architecture. 
650 6 |a Gestion  |x Informatique. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Management  |x Data processing  |2 fast 
650 7 |a Business  |x Data processing  |2 fast 
650 7 |a Computer architecture  |2 fast 
650 7 |a Computer security  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781849685962/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26850930 
938 |a ebrary  |b EBRY  |n ebr10672332 
994 |a 92  |b IZTAP