|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1101904509 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
190520s2019 caua o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|z 9781492050353
|
035 |
|
|
|a (OCoLC)1101904509
|
037 |
|
|
|a CL0501000049
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.875.I6
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gates, Stephen,
|e author.
|
245 |
1 |
0 |
|a Modern defense in depth :
|b an integrated approach to better web application security /
|c Stephen Gates.
|
246 |
3 |
0 |
|a Integrated approach to better web application security
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c 2019.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (viewed May 16, 2019).
|
520 |
|
|
|a Despite deploying the latest security technologies, organizations still struggle to defend cloud-based web applications against sophisticated cyberattacks. Many companies have turned to the popular defense-in-depth (DiD) technique, but this multilayered approach has its shortcomings. So where is the industry headed next? This insightful ebook demonstrates a new approach to DiD that enables current security tools to operate in concert rather than independently. Stephen Gates, edge security evangelist and SME at Oracle Dyn, shows you how companies can establish integrated lines of defense similar to the way in which modern militaries operate on the battlefield. By the end of this book, CSOs, CISOs, security managers, and other professionals will understand how to implement the recommendations in this book today using the security technologies they already have in place. With this ebook, you'll examine: Why today's security technologies alone aren't enough to protect web applications How the existing approach to DiD for cybersecurity falls short of its goals An example of how the modern military uses integrated lines of defense that work in concert Eight lines of defense--including edge routers, DDoS defenses, and WAFs--that are best for protecting cloud-based web applications Ways to use automation and supervised machine learning to integrate your security approaches.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Web applications
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Malware (Computer software)
|
650 |
|
6 |
|a Applications Web
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Logiciels malveillants.
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Malware (Computer software)
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492050360/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|