000 08114cam a2200997 i 4500
001 ocn906699046
003 OCoLC
005 20240523125538.0
006 m o d
007 cr cnu|||unuuu
008 150407s2015 inu ob 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dIDEBK
_dE7B
_dCDX
_dYDXCP
_dEBLCP
_dOCLCF
_dUMI
_dDG1
_dCOO
_dRECBK
_dDEBSZ
_dOCLCQ
_dDEBBG
_dKSU
_dK6U
_dIDB
_dCOCUF
_dDG1
_dS4S
_dCCO
_dLIP
_dPIFFA
_dFVL
_dZCU
_dOCLCQ
_dMERUC
_dOCLCQ
_dSAKAP
_dU3W
_dOCLCA
_dOCLCQ
_dSTF
_dICG
_dINT
_dVT2
_dOCLCQ
_dWYU
_dTKN
_dOCLCQ
_dDKC
_dAU@
_dOCLCQ
_dUKAHL
_dOCLCQ
_dUKSSU
_dTUHNV
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
_dOCLCQ
016 7 _a017372097
_2Uk
019 _a908080285
_a914287647
_a961627624
_a962627152
_a981865306
_a989213767
_a1010606339
_a1055359930
_a1066650191
_a1081220383
_a1138976882
020 _a9781118896679
_q(electronic bk.)
020 _a111889667X
_q(electronic bk.)
020 _a9781118896662
_q(electronic bk.)
020 _a1118896661
_q(electronic bk.)
020 _a9781119183617
_q(electronic bk.)
020 _a1119183618
_q(electronic bk.)
020 _a1118896696
020 _a9781118896693
020 _z9781118896693
029 1 _aAU@
_b000054954842
029 1 _aAU@
_b000060217161
029 1 _aDEBBG
_bBV043397685
029 1 _aDEBBG
_bBV043615808
029 1 _aDEBSZ
_b452647193
029 1 _aDEBSZ
_b453328733
029 1 _aDEBSZ
_b468874828
029 1 _aDKDLA
_b820120-katalog:999925482205765
035 _a(OCoLC)906699046
_z(OCoLC)908080285
_z(OCoLC)914287647
_z(OCoLC)961627624
_z(OCoLC)962627152
_z(OCoLC)981865306
_z(OCoLC)989213767
_z(OCoLC)1010606339
_z(OCoLC)1055359930
_z(OCoLC)1066650191
_z(OCoLC)1081220383
_z(OCoLC)1138976882
037 _aCL0500000619
_bSafari Books Online
050 4 _aTK5105.59
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
049 _aMAIN
100 1 _aLi, Qing,
_d1971-
_eauthor.
_1https://id.oclc.org/worldcat/entity/E39PCjBkFMhVVxyVY7gkBVQkTb
245 1 0 _aSecurity intelligence :
_ba practitioner's guide to solving enterprise security challenges /
_cQing Li, Gregory Clark.
264 1 _aIndianapolis, IN :
_bWiley,
_c2015.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
588 0 _aOnline resource; title from PDF title page (Ebsco, viewed April 13, 2015).
504 _aIncludes bibliographical references and index.
505 0 _aSecurity Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges; Contents; Foreword; Preface; Chapter 1 Fundamentals of Secure Proxies; Security Must Protect and Empower Users; The Birth of Shadow IT; Internet of Things and Connected Consumer Appliances; Conventional Security Solutions; Traditional Firewalls: What Are Their Main Deficiencies?; Firewall with DPI: A Better Solution?; IDS/IPS and Firewall; Unified Threat Management and Next-Generation Firewall; Security Proxy-A Necessary Extension of the End Point; Transaction-Based Processing; The Proxy Architecture.
505 8 _aSSL Proxy and InterceptionInterception Strategies; Certificates and Keys; Certificate Pinning and OCSP Stapling; SSL Interception and Privacy; Summary; Chapter 2 Proxy Deployment Strategies and Challenges; Definitions of Proxy Types: Transparent Proxy and Explicit Proxy; Inline Deployment of Transparent Proxy: Physical Inline and Virtual Inline; Physical Inline Deployment; Virtual Inline Deployment; Traffic Redirection Methods: WCCP and PBR; LAN Port and WAN Port; Forward Proxy and Reverse Proxy; Challenges of Transparent Interception; Directionality of Connections; Maintaining Traffic Paths.
505 8 _aAvoiding InterceptionAsymmetric Traffic Flow Detection and Clustering; Proxy Chaining; Summary; Chapter 3 Proxy Policy Engine and Policy Enforcements; Policy System Overview; Conditions and Properties; Policy Transaction; Policy Ticket; Policy Updates and Versioning System; Security Implications; Policy System in the Cloud Security Operation; Policy Evaluation; Policy Checkpoint; Policy Execution Timing; Revisiting the Proxy Interception Steps; Enforcing External Policy Decisions; Summary; Chapter 4 Malware and Malware Delivery Networks; Cyber Warfare and Targeted Attacks.
505 8 _aEspionage and Sabotage in CyberspaceIndustrial Espionage; Operation Aurora; Watering Hole Attack; Breaching the Trusted Third Party; Casting the Lures; Spear Phishing; Pharming; Cross-Site Scripting; Search Engine Poisoning; Drive-by Downloads and the Invisible iframe; Tangled Malvertising Networks; Malware Delivery Networks; Fast-Flux Networks; Explosion of Domain Names; Abandoned Sites and Domain Names; Antivirus Software and End-Point Solutions -- The Losing Battle; Summary; Chapter 5 Malnet Detection Techniques; Automated URL Reputation System; Creating URL Training Sets.
505 8 _aExtracting URL Feature SetsClassifier Training; Dynamic Webpage Content Rating; Keyword Extraction for Category Construction; Keyword Categorization; Detecting Malicious Web Infrastructure; Detecting Exploit Servers through Content Analysis; Topology-Based Detection of Dedicated Malicious Hosts; Detecting C2 Servers; Detection Based on Download Similarities; Crawlers; Detecting Malicious Servers with a Honeyclient; High Interaction versus Low Interaction; Capture-HPC: A High-Interaction Honeyclient; Thug: A Low-Interaction Honeyclient; Evading Honeyclients; Summary; Chapter 6 Writing Policies.
520 _aIdentify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aElectronic information resources
_xAccess control.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer security.
650 6 _aSources d'information �electroniques
_xAcc�es
_xContr�ole.
650 6 _aR�eseaux d'ordinateurs
_xS�ecurit�e
_xMesures.
650 6 _aS�ecurit�e informatique.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aComputer security
_2fast
650 7 _aElectronic information resources
_xAccess control
_2fast
650 7 _aComputers and IT.
_2ukslc
700 1 _aClark, Gregory,
_eauthor.
758 _ihas work:
_aSecurity intelligence (Text)
_1https://id.oclc.org/worldcat/entity/E39PCFtfrbtDXF8KHR3jyPbJ9P
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aLi, Qing.
_tSecurity Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges.
_dHoboken : Wiley, �2015
_z9781118896693
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617
938 _aAskews and Holts Library Services
_bASKH
_nAH27099085
938 _aAskews and Holts Library Services
_bASKH
_nAH27099016
938 _aCoutts Information Services
_bCOUT
_n29819340
938 _aEBL - Ebook Library
_bEBLB
_nEBL4444811
938 _aEBL - Ebook Library
_bEBLB
_nEBL1895130
938 _aebrary
_bEBRY
_nebr11041436
938 _aEBSCOhost
_bEBSC
_n975603
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_ncis29819340
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00624003
938 _aYBP Library Services
_bYANK
_n12599004
938 _aYBP Library Services
_bYANK
_n12367766
938 _aYBP Library Services
_bYANK
_n12673572
994 _a92
_bINLUM
999 _c12193
_d12193