Cargando…

The value of operations security /

"While policy creation and maintenance is a common focus for information security, policies leave a lot of room for implementation and interpretation. Complying with a good set of security policies does not guarantee that your organization is well-protected against attack. Your organization nee...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Messier, Ric (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly, [2016]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000Ii 4500
001 OR_ocn957677190
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 160902s2016 xx 051 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCA  |d UAB  |d ERF  |d OCLCO 
035 |a (OCoLC)957677190 
037 |a CL0500000774  |b Safari Books Online 
050 4 |a HD30.2 
049 |a UAMI 
100 1 |a Messier, Ric,  |e speaker. 
245 1 4 |a The value of operations security /  |c with Ric Messier. 
264 1 |a [Place of publication not identified] :  |b O'Reilly,  |c [2016] 
300 |a 1 online resource (1 streaming video file (50 min., 47 sec.)) :  |b digital, sound, color 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
511 0 |a Presenter, Ric Messier. 
500 |a Title from title screen (viewed September 1, 2016). 
500 |a Date of publication from resource description page. 
520 |a "While policy creation and maintenance is a common focus for information security, policies leave a lot of room for implementation and interpretation. Complying with a good set of security policies does not guarantee that your organization is well-protected against attack. Your organization needs a good operations security team to implement security measures.In this webcast, Security Professional Ric Messier will identify key points to understanding operations security and the need for a focus on it: details on potential components of a solid operations security plan, understanding the importance of detection and response capabilities in near-real time. Audience members will come away learning: What is operations security, policy shortcomings, regulations and compliance threats to operations, operational protections, detection capabilities, responding to threats in real-time, feedback loops."--Resource description page. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Evaluation. 
650 0 |a Information technology  |x Management. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Évaluation. 
650 6 |a Technologie de l'information  |x Gestion. 
650 7 |a Computer security  |x Evaluation.  |2 fast  |0 (OCoLC)fst00872488 
650 7 |a Information technology  |x Management.  |2 fast  |0 (OCoLC)fst00973112 
650 7 |a Information technology  |x Security measures.  |2 fast  |0 (OCoLC)fst00973129 
655 4 |a Electronic videos. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781491972441/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP