Book description
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. You will learn about:
Secure proxies - the necessary extension of the endpoints
Application identification and control - visualize the threats
Malnets - where is the source of infection and who are the pathogens
Identify the security breach - who was the victim and what was the lure
Security in Mobile computing - SNAFU
With this book, you will be able to:
Identify the relevant solutions to secure the infrastructure
Construct policies that provide flexibility to the users so to ensure productivity
Deploy effective defenses against the ever evolving web threats
Implement solutions that are compliant to relevant rules and regulations
Offer insight to developers who are building new security solutions and products
Table of contents
- Cover Page
- Title Page
- Copyright
- Dedication
- Credits
- About the Authors
- Acknowledgments
- Contents
- Foreword
- Preface
- CHAPTER 1: Fundamentals of Secure Proxies
- CHAPTER 2: Proxy Deployment Strategies and Challenges
- CHAPTER 3: Proxy Policy Engine and Policy Enforcements
- CHAPTER 4: Malware and Malware Delivery Networks
- CHAPTER 5: Malnet Detection Techniques
- CHAPTER 6: Writing Policies
- CHAPTER 7: The Art of Application Classification
- CHAPTER 8: Retrospective Analysis
- CHAPTER 9: Mobile Security
- Bibliography
- Index
Product information
- Title: Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges
- Author(s):
- Release date: April 2015
- Publisher(s): Wiley
- ISBN: 9781118896693
You might also like
book
Inside Network Security Assessment: Guarding Your IT Infrastructure
As an IT professional, you need to know how to perform network security assessments. Inside Network …
book
People-Centric Security: Transforming Your Enterprise Security Culture
A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile …
book
Executive Guide to Information Security, The: Threats, Challenges, and Solutions
Praise for The Executive Guide to Information Security "In today's world, no business can operate without …
book
Modernizing Cybersecurity Operations with Machine Intelligence
Adversaries and hackers have gained significant and distinct advantages in cyber warfare today. Creative, fast, and …