NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Security intelligence : (Record no. 12193)

MARC details
000 -LEADER
fixed length control field 08114cam a2200997 i 4500
001 - CONTROL NUMBER
control field ocn906699046
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125538.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150407s2015 inu ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency N$T
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency N$T
Modifying agency N$T
-- IDEBK
-- E7B
-- CDX
-- YDXCP
-- EBLCP
-- OCLCF
-- UMI
-- DG1
-- COO
-- RECBK
-- DEBSZ
-- OCLCQ
-- DEBBG
-- KSU
-- K6U
-- IDB
-- COCUF
-- DG1
-- S4S
-- CCO
-- LIP
-- PIFFA
-- FVL
-- ZCU
-- OCLCQ
-- MERUC
-- OCLCQ
-- SAKAP
-- U3W
-- OCLCA
-- OCLCQ
-- STF
-- ICG
-- INT
-- VT2
-- OCLCQ
-- WYU
-- TKN
-- OCLCQ
-- DKC
-- AU@
-- OCLCQ
-- UKAHL
-- OCLCQ
-- UKSSU
-- TUHNV
-- OCLCO
-- OCLCQ
-- OCLCO
-- OCLCL
-- OCLCQ
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 017372097
Source Uk
019 ## -
-- 908080285
-- 914287647
-- 961627624
-- 962627152
-- 981865306
-- 989213767
-- 1010606339
-- 1055359930
-- 1066650191
-- 1081220383
-- 1138976882
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118896679
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 111889667X
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118896662
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118896661
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119183617
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119183618
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118896696
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118896693
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781118896693
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000054954842
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000060217161
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV043397685
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV043615808
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 452647193
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 453328733
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 468874828
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DKDLA
System control number 820120-katalog:999925482205765
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)906699046
Canceled/invalid control number (OCoLC)908080285
-- (OCoLC)914287647
-- (OCoLC)961627624
-- (OCoLC)962627152
-- (OCoLC)981865306
-- (OCoLC)989213767
-- (OCoLC)1010606339
-- (OCoLC)1055359930
-- (OCoLC)1066650191
-- (OCoLC)1081220383
-- (OCoLC)1138976882
037 ## - SOURCE OF ACQUISITION
Stock number CL0500000619
Source of stock number/acquisition Safari Books Online
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Li, Qing,
Dates associated with a name 1971-
Relator term author.
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCjBkFMhVVxyVY7gkBVQkTb
245 10 - TITLE STATEMENT
Title Security intelligence :
Remainder of title a practitioner's guide to solving enterprise security challenges /
Statement of responsibility, etc. Qing Li, Gregory Clark.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, IN :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from PDF title page (Ebsco, viewed April 13, 2015).
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges; Contents; Foreword; Preface; Chapter 1 Fundamentals of Secure Proxies; Security Must Protect and Empower Users; The Birth of Shadow IT; Internet of Things and Connected Consumer Appliances; Conventional Security Solutions; Traditional Firewalls: What Are Their Main Deficiencies?; Firewall with DPI: A Better Solution?; IDS/IPS and Firewall; Unified Threat Management and Next-Generation Firewall; Security Proxy-A Necessary Extension of the End Point; Transaction-Based Processing; The Proxy Architecture.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note SSL Proxy and InterceptionInterception Strategies; Certificates and Keys; Certificate Pinning and OCSP Stapling; SSL Interception and Privacy; Summary; Chapter 2 Proxy Deployment Strategies and Challenges; Definitions of Proxy Types: Transparent Proxy and Explicit Proxy; Inline Deployment of Transparent Proxy: Physical Inline and Virtual Inline; Physical Inline Deployment; Virtual Inline Deployment; Traffic Redirection Methods: WCCP and PBR; LAN Port and WAN Port; Forward Proxy and Reverse Proxy; Challenges of Transparent Interception; Directionality of Connections; Maintaining Traffic Paths.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Avoiding InterceptionAsymmetric Traffic Flow Detection and Clustering; Proxy Chaining; Summary; Chapter 3 Proxy Policy Engine and Policy Enforcements; Policy System Overview; Conditions and Properties; Policy Transaction; Policy Ticket; Policy Updates and Versioning System; Security Implications; Policy System in the Cloud Security Operation; Policy Evaluation; Policy Checkpoint; Policy Execution Timing; Revisiting the Proxy Interception Steps; Enforcing External Policy Decisions; Summary; Chapter 4 Malware and Malware Delivery Networks; Cyber Warfare and Targeted Attacks.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Espionage and Sabotage in CyberspaceIndustrial Espionage; Operation Aurora; Watering Hole Attack; Breaching the Trusted Third Party; Casting the Lures; Spear Phishing; Pharming; Cross-Site Scripting; Search Engine Poisoning; Drive-by Downloads and the Invisible iframe; Tangled Malvertising Networks; Malware Delivery Networks; Fast-Flux Networks; Explosion of Domain Names; Abandoned Sites and Domain Names; Antivirus Software and End-Point Solutions -- The Losing Battle; Summary; Chapter 5 Malnet Detection Techniques; Automated URL Reputation System; Creating URL Training Sets.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Extracting URL Feature SetsClassifier Training; Dynamic Webpage Content Rating; Keyword Extraction for Category Construction; Keyword Categorization; Detecting Malicious Web Infrastructure; Detecting Exploit Servers through Content Analysis; Topology-Based Detection of Dedicated Malicious Hosts; Detecting C2 Servers; Detection Based on Download Similarities; Crawlers; Detecting Malicious Servers with a Honeyclient; High Interaction versus Low Interaction; Capture-HPC: A High-Interaction Honeyclient; Thug: A Low-Interaction Honeyclient; Evading Honeyclients; Summary; Chapter 6 Writing Policies.
520 ## - SUMMARY, ETC.
Summary, etc. Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic information resources
General subdivision Access control.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Sources d'information �electroniques
General subdivision Acc�es
-- Contr�ole.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element R�eseaux d'ordinateurs
General subdivision S�ecurit�e
-- Mesures.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element S�ecurit�e informatique.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Internet
-- Security.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Networking
-- Security.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic information resources
General subdivision Access control
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers and IT.
Source of heading or term ukslc
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Clark, Gregory,
Relator term author.
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label Security intelligence (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCFtfrbtDXF8KHR3jyPbJ9P
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Li, Qing.
Title Security Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges.
Place, publisher, and date of publication Hoboken : Wiley, �2015
International Standard Book Number 9781118896693
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH27099085
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH27099016
938 ## -
-- Coutts Information Services
-- COUT
-- 29819340
938 ## -
-- EBL - Ebook Library
-- EBLB
-- EBL4444811
938 ## -
-- EBL - Ebook Library
-- EBLB
-- EBL1895130
938 ## -
-- ebrary
-- EBRY
-- ebr11041436
938 ## -
-- EBSCOhost
-- EBSC
-- 975603
938 ## -
-- ProQuest MyiLibrary Digital eBook Collection
-- IDEB
-- cis29819340
938 ## -
-- Recorded Books, LLC
-- RECE
-- rbeEB00624003
938 ## -
-- YBP Library Services
-- YANK
-- 12599004
938 ## -
-- YBP Library Services
-- YANK
-- 12367766
938 ## -
-- YBP Library Services
-- YANK
-- 12673572
994 ## -
-- 92
-- INLUM

No items available.