|
|
|
|
LEADER |
00000cgm a2200000Ii 4500 |
001 |
OR_ocn957677190 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
160902s2016 xx 051 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCA
|d UAB
|d ERF
|d OCLCO
|
035 |
|
|
|a (OCoLC)957677190
|
037 |
|
|
|a CL0500000774
|b Safari Books Online
|
050 |
|
4 |
|a HD30.2
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Messier, Ric,
|e speaker.
|
245 |
1 |
4 |
|a The value of operations security /
|c with Ric Messier.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly,
|c [2016]
|
300 |
|
|
|a 1 online resource (1 streaming video file (50 min., 47 sec.)) :
|b digital, sound, color
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
511 |
0 |
|
|a Presenter, Ric Messier.
|
500 |
|
|
|a Title from title screen (viewed September 1, 2016).
|
500 |
|
|
|a Date of publication from resource description page.
|
520 |
|
|
|a "While policy creation and maintenance is a common focus for information security, policies leave a lot of room for implementation and interpretation. Complying with a good set of security policies does not guarantee that your organization is well-protected against attack. Your organization needs a good operations security team to implement security measures.In this webcast, Security Professional Ric Messier will identify key points to understanding operations security and the need for a focus on it: details on potential components of a solid operations security plan, understanding the importance of detection and response capabilities in near-real time. Audience members will come away learning: What is operations security, policy shortcomings, regulations and compliance threats to operations, operational protections, detection capabilities, responding to threats in real-time, feedback loops."--Resource description page.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer security
|x Evaluation.
|
650 |
|
0 |
|a Information technology
|x Management.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique
|x Évaluation.
|
650 |
|
6 |
|a Technologie de l'information
|x Gestion.
|
650 |
|
7 |
|a Computer security
|x Evaluation.
|2 fast
|0 (OCoLC)fst00872488
|
650 |
|
7 |
|a Information technology
|x Management.
|2 fast
|0 (OCoLC)fst00973112
|
650 |
|
7 |
|a Information technology
|x Security measures.
|2 fast
|0 (OCoLC)fst00973129
|
655 |
|
4 |
|a Electronic videos.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781491972441/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|