Get Free Shipping on orders over $79
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges : A Practitioner's Guide to Solving Enterprise Security Challenges - Qing Li

Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

A Practitioner's Guide to Solving Enterprise Security Challenges

By: Qing Li, Gregory Clark

eText | 16 April 2015 | Edition Number 1

At a Glance

eText


$75.89

or 4 interest-free payments of $18.97 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. You will learn about:

  • Secure proxies - the necessary extension of the endpoints
  • Application identification and control - visualize the threats
  • Malnets - where is the source of infection and who are the pathogens
  • Identify the security breach - who was the victim and what was the lure
  • Security in Mobile computing - SNAFU

With this book, you will be able to:

  • Identify the relevant solutions to secure the infrastructure
  • Construct policies that provide flexibility to the users so to ensure productivity
  • Deploy effective defenses against the ever evolving web threats
  • Implement solutions that are compliant to relevant rules and regulations
  • Offer insight to developers who are building new security solutions and products
on
Desktop
Tablet
Mobile

More in Data Encryption

The Book of Mitigations - Felipe Reitz

eBOOK

Cybersecurity Explained - Anders Askåsen

eBOOK