000 | 08114cam a2200997 i 4500 | ||
---|---|---|---|
001 | ocn906699046 | ||
003 | OCoLC | ||
005 | 20240523125538.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 150407s2015 inu ob 001 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dIDEBK _dE7B _dCDX _dYDXCP _dEBLCP _dOCLCF _dUMI _dDG1 _dCOO _dRECBK _dDEBSZ _dOCLCQ _dDEBBG _dKSU _dK6U _dIDB _dCOCUF _dDG1 _dS4S _dCCO _dLIP _dPIFFA _dFVL _dZCU _dOCLCQ _dMERUC _dOCLCQ _dSAKAP _dU3W _dOCLCA _dOCLCQ _dSTF _dICG _dINT _dVT2 _dOCLCQ _dWYU _dTKN _dOCLCQ _dDKC _dAU@ _dOCLCQ _dUKAHL _dOCLCQ _dUKSSU _dTUHNV _dOCLCO _dOCLCQ _dOCLCO _dOCLCL _dOCLCQ |
||
016 | 7 |
_a017372097 _2Uk |
|
019 |
_a908080285 _a914287647 _a961627624 _a962627152 _a981865306 _a989213767 _a1010606339 _a1055359930 _a1066650191 _a1081220383 _a1138976882 |
||
020 |
_a9781118896679 _q(electronic bk.) |
||
020 |
_a111889667X _q(electronic bk.) |
||
020 |
_a9781118896662 _q(electronic bk.) |
||
020 |
_a1118896661 _q(electronic bk.) |
||
020 |
_a9781119183617 _q(electronic bk.) |
||
020 |
_a1119183618 _q(electronic bk.) |
||
020 | _a1118896696 | ||
020 | _a9781118896693 | ||
020 | _z9781118896693 | ||
029 | 1 |
_aAU@ _b000054954842 |
|
029 | 1 |
_aAU@ _b000060217161 |
|
029 | 1 |
_aDEBBG _bBV043397685 |
|
029 | 1 |
_aDEBBG _bBV043615808 |
|
029 | 1 |
_aDEBSZ _b452647193 |
|
029 | 1 |
_aDEBSZ _b453328733 |
|
029 | 1 |
_aDEBSZ _b468874828 |
|
029 | 1 |
_aDKDLA _b820120-katalog:999925482205765 |
|
035 |
_a(OCoLC)906699046 _z(OCoLC)908080285 _z(OCoLC)914287647 _z(OCoLC)961627624 _z(OCoLC)962627152 _z(OCoLC)981865306 _z(OCoLC)989213767 _z(OCoLC)1010606339 _z(OCoLC)1055359930 _z(OCoLC)1066650191 _z(OCoLC)1081220383 _z(OCoLC)1138976882 |
||
037 |
_aCL0500000619 _bSafari Books Online |
||
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 | _a005.8 |
049 | _aMAIN | ||
100 | 1 |
_aLi, Qing, _d1971- _eauthor. _1https://id.oclc.org/worldcat/entity/E39PCjBkFMhVVxyVY7gkBVQkTb |
|
245 | 1 | 0 |
_aSecurity intelligence : _ba practitioner's guide to solving enterprise security challenges / _cQing Li, Gregory Clark. |
264 | 1 |
_aIndianapolis, IN : _bWiley, _c2015. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
588 | 0 | _aOnline resource; title from PDF title page (Ebsco, viewed April 13, 2015). | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aSecurity Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges; Contents; Foreword; Preface; Chapter 1 Fundamentals of Secure Proxies; Security Must Protect and Empower Users; The Birth of Shadow IT; Internet of Things and Connected Consumer Appliances; Conventional Security Solutions; Traditional Firewalls: What Are Their Main Deficiencies?; Firewall with DPI: A Better Solution?; IDS/IPS and Firewall; Unified Threat Management and Next-Generation Firewall; Security Proxy-A Necessary Extension of the End Point; Transaction-Based Processing; The Proxy Architecture. | |
505 | 8 | _aSSL Proxy and InterceptionInterception Strategies; Certificates and Keys; Certificate Pinning and OCSP Stapling; SSL Interception and Privacy; Summary; Chapter 2 Proxy Deployment Strategies and Challenges; Definitions of Proxy Types: Transparent Proxy and Explicit Proxy; Inline Deployment of Transparent Proxy: Physical Inline and Virtual Inline; Physical Inline Deployment; Virtual Inline Deployment; Traffic Redirection Methods: WCCP and PBR; LAN Port and WAN Port; Forward Proxy and Reverse Proxy; Challenges of Transparent Interception; Directionality of Connections; Maintaining Traffic Paths. | |
505 | 8 | _aAvoiding InterceptionAsymmetric Traffic Flow Detection and Clustering; Proxy Chaining; Summary; Chapter 3 Proxy Policy Engine and Policy Enforcements; Policy System Overview; Conditions and Properties; Policy Transaction; Policy Ticket; Policy Updates and Versioning System; Security Implications; Policy System in the Cloud Security Operation; Policy Evaluation; Policy Checkpoint; Policy Execution Timing; Revisiting the Proxy Interception Steps; Enforcing External Policy Decisions; Summary; Chapter 4 Malware and Malware Delivery Networks; Cyber Warfare and Targeted Attacks. | |
505 | 8 | _aEspionage and Sabotage in CyberspaceIndustrial Espionage; Operation Aurora; Watering Hole Attack; Breaching the Trusted Third Party; Casting the Lures; Spear Phishing; Pharming; Cross-Site Scripting; Search Engine Poisoning; Drive-by Downloads and the Invisible iframe; Tangled Malvertising Networks; Malware Delivery Networks; Fast-Flux Networks; Explosion of Domain Names; Abandoned Sites and Domain Names; Antivirus Software and End-Point Solutions -- The Losing Battle; Summary; Chapter 5 Malnet Detection Techniques; Automated URL Reputation System; Creating URL Training Sets. | |
505 | 8 | _aExtracting URL Feature SetsClassifier Training; Dynamic Webpage Content Rating; Keyword Extraction for Category Construction; Keyword Categorization; Detecting Malicious Web Infrastructure; Detecting Exploit Servers through Content Analysis; Topology-Based Detection of Dedicated Malicious Hosts; Detecting C2 Servers; Detection Based on Download Similarities; Crawlers; Detecting Malicious Servers with a Honeyclient; High Interaction versus Low Interaction; Capture-HPC: A High-Interaction Honeyclient; Thug: A Low-Interaction Honeyclient; Evading Honeyclients; Summary; Chapter 6 Writing Policies. | |
520 | _aIdentify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 |
_aElectronic information resources _xAccess control. |
|
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer security. | |
650 | 6 |
_aSources d'information �electroniques _xAcc�es _xContr�ole. |
|
650 | 6 |
_aR�eseaux d'ordinateurs _xS�ecurit�e _xMesures. |
|
650 | 6 | _aS�ecurit�e informatique. | |
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures _2fast |
|
650 | 7 |
_aComputer security _2fast |
|
650 | 7 |
_aElectronic information resources _xAccess control _2fast |
|
650 | 7 |
_aComputers and IT. _2ukslc |
|
700 | 1 |
_aClark, Gregory, _eauthor. |
|
758 |
_ihas work: _aSecurity intelligence (Text) _1https://id.oclc.org/worldcat/entity/E39PCFtfrbtDXF8KHR3jyPbJ9P _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _aLi, Qing. _tSecurity Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges. _dHoboken : Wiley, �2015 _z9781118896693 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617 |
938 |
_aAskews and Holts Library Services _bASKH _nAH27099085 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH27099016 |
||
938 |
_aCoutts Information Services _bCOUT _n29819340 |
||
938 |
_aEBL - Ebook Library _bEBLB _nEBL4444811 |
||
938 |
_aEBL - Ebook Library _bEBLB _nEBL1895130 |
||
938 |
_aebrary _bEBRY _nebr11041436 |
||
938 |
_aEBSCOhost _bEBSC _n975603 |
||
938 |
_aProQuest MyiLibrary Digital eBook Collection _bIDEB _ncis29819340 |
||
938 |
_aRecorded Books, LLC _bRECE _nrbeEB00624003 |
||
938 |
_aYBP Library Services _bYANK _n12599004 |
||
938 |
_aYBP Library Services _bYANK _n12367766 |
||
938 |
_aYBP Library Services _bYANK _n12673572 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12193 _d12193 |