Login

Clark, Gregory

Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

Clark, Gregory - Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges, ebook

56,45€

Ebook, ePUB with Adobe DRM
ISBN: 9781118896662
DRM Restrictions

Printing108 pages with an additional page accrued every 7 hours, capped at 108 pages
Copy to clipboard5 excerpts

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. You will learn about:

  • Secure proxies – the necessary extension of the endpoints
  • Application identification and control – visualize the threats
  • Malnets – where is the source of infection and who are the pathogens
  • Identify the security breach – who was the victim and what was the lure
  • Security in Mobile computing – SNAFU

With this book, you will be able to:

  • Identify the relevant solutions to secure the infrastructure
  • Construct policies that provide flexibility to the users so to ensure productivity
  • Deploy effective defenses against the ever evolving web threats
  • Implement solutions that are compliant to relevant rules and regulations
  • Offer insight to developers who are building new security solutions and products

Keywords: Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges; Qing Li; Blue Coat Systems; IT security; data security; IT infrastructure security; IT security deployment; IT security breach identification; hidden security breaches; implementing web defenses; IT security compliance; application identification and control; malnets; mobile IT security; secure proxies; IT security analysis; data security; securing data; enterprise security implementation; flexible enterprise IT security policies

Author(s)
 
Publisher
John Wiley and Sons, Inc.
Publication year
2015
Language
en
Edition
1
Page amount
360 pages
Category
Information Technology, Telecommunications
Format
Ebook
eISBN (ePUB)
9781118896662
Printed ISBN
9781118896693

Similar titles