Cargando…

Modern defense in depth : an integrated approach to better web application security /

Despite deploying the latest security technologies, organizations still struggle to defend cloud-based web applications against sophisticated cyberattacks. Many companies have turned to the popular defense-in-depth (DiD) technique, but this multilayered approach has its shortcomings. So where is the...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gates, Stephen (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, 2019.
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1101904509
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 190520s2019 caua o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d CZL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |z 9781492050353 
035 |a (OCoLC)1101904509 
037 |a CL0501000049  |b Safari Books Online 
050 4 |a TK5105.875.I6 
049 |a UAMI 
100 1 |a Gates, Stephen,  |e author. 
245 1 0 |a Modern defense in depth :  |b an integrated approach to better web application security /  |c Stephen Gates. 
246 3 0 |a Integrated approach to better web application security 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c 2019. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (viewed May 16, 2019). 
520 |a Despite deploying the latest security technologies, organizations still struggle to defend cloud-based web applications against sophisticated cyberattacks. Many companies have turned to the popular defense-in-depth (DiD) technique, but this multilayered approach has its shortcomings. So where is the industry headed next? This insightful ebook demonstrates a new approach to DiD that enables current security tools to operate in concert rather than independently. Stephen Gates, edge security evangelist and SME at Oracle Dyn, shows you how companies can establish integrated lines of defense similar to the way in which modern militaries operate on the battlefield. By the end of this book, CSOs, CISOs, security managers, and other professionals will understand how to implement the recommendations in this book today using the security technologies they already have in place. With this ebook, you'll examine: Why today's security technologies alone aren't enough to protect web applications How the existing approach to DiD for cybersecurity falls short of its goals An example of how the modern military uses integrated lines of defense that work in concert Eight lines of defense--including edge routers, DDoS defenses, and WAFs--that are best for protecting cloud-based web applications Ways to use automation and supervised machine learning to integrate your security approaches. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Web applications  |x Security measures. 
650 0 |a Data protection. 
650 0 |a Malware (Computer software) 
650 6 |a Applications Web  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Logiciels malveillants. 
650 7 |a Data protection  |2 fast 
650 7 |a Malware (Computer software)  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781492050360/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP