Security intelligence : (Record no. 18636)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06599cam a2200805Ii 4500 |
001 - CONTROL NUMBER | |
control field | ocn906699046 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230823095408.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 150407s2015 inu ob 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | N$T |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | N$T |
Modifying agency | N$T |
-- | IDEBK |
-- | E7B |
-- | CDX |
-- | YDXCP |
-- | EBLCP |
-- | OCLCF |
-- | UMI |
-- | DG1 |
-- | COO |
-- | RECBK |
-- | DEBSZ |
-- | OCLCQ |
-- | DEBBG |
-- | KSU |
-- | K6U |
019 ## - | |
-- | 908080285 |
-- | 914287647 |
-- | 961627624 |
-- | 962627152 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781118896679 |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 111889667X |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781118896662 |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1118896661 |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119183617 |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119183618 |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Cancelled/invalid ISBN | 9781118896693 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1118896696 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781118896693 |
029 1# - (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000054954842 |
029 1# - (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 453328733 |
029 1# - (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 452647193 |
029 1# - (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV043615808 |
029 1# - (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV043397685 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)906699046 |
Canceled/invalid control number | (OCoLC)908080285 |
-- | (OCoLC)914287647 |
-- | (OCoLC)961627624 |
-- | (OCoLC)962627152 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | CL0500000619 |
Source of stock number/acquisition | Safari Books Online |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 060040 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 043050 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 053000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Li, Qing, |
Dates associated with a name | 1971- |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Security intelligence : |
Remainder of title | a practitioner's guide to solving enterprise security challenges / |
Statement of responsibility, etc | Qing Li, Gregory Clark. |
264 #1 - | |
-- | Indianapolis, IN : |
-- | Wiley, |
-- | 2015. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
588 0# - | |
-- | Online resource; title from PDF title page (Ebsco, viewed April 13, 2015). |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges; Contents; Foreword; Preface; Chapter 1 Fundamentals of Secure Proxies; Security Must Protect and Empower Users; The Birth of Shadow IT; Internet of Things and Connected Consumer Appliances; Conventional Security Solutions; Traditional Firewalls: What Are Their Main Deficiencies?; Firewall with DPI: A Better Solution?; IDS/IPS and Firewall; Unified Threat Management and Next-Generation Firewall; Security Proxy-A Necessary Extension of the End Point; Transaction-Based Processing; The Proxy Architecture |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | SSL Proxy and InterceptionInterception Strategies; Certificates and Keys; Certificate Pinning and OCSP Stapling; SSL Interception and Privacy; Summary; Chapter 2 Proxy Deployment Strategies and Challenges; Definitions of Proxy Types: Transparent Proxy and Explicit Proxy; Inline Deployment of Transparent Proxy: Physical Inline and Virtual Inline; Physical Inline Deployment; Virtual Inline Deployment; Traffic Redirection Methods: WCCP and PBR; LAN Port and WAN Port; Forward Proxy and Reverse Proxy; Challenges of Transparent Interception; Directionality of Connections; Maintaining Traffic Paths |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Avoiding InterceptionAsymmetric Traffic Flow Detection and Clustering; Proxy Chaining; Summary; Chapter 3 Proxy Policy Engine and Policy Enforcements; Policy System Overview; Conditions and Properties; Policy Transaction; Policy Ticket; Policy Updates and Versioning System; Security Implications; Policy System in the Cloud Security Operation; Policy Evaluation; Policy Checkpoint; Policy Execution Timing; Revisiting the Proxy Interception Steps; Enforcing External Policy Decisions; Summary; Chapter 4 Malware and Malware Delivery Networks; Cyber Warfare and Targeted Attacks |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Espionage and Sabotage in CyberspaceIndustrial Espionage; Operation Aurora; Watering Hole Attack; Breaching the Trusted Third Party; Casting the Lures; Spear Phishing; Pharming; Cross-Site Scripting; Search Engine Poisoning; Drive-by Downloads and the Invisible iframe; Tangled Malvertising Networks; Malware Delivery Networks; Fast-Flux Networks; Explosion of Domain Names; Abandoned Sites and Domain Names; Antivirus Software and End-Point Solutions -- The Losing Battle; Summary; Chapter 5 Malnet Detection Techniques; Automated URL Reputation System; Creating URL Training Sets |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Extracting URL Feature SetsClassifier Training; Dynamic Webpage Content Rating; Keyword Extraction for Category Construction; Keyword Categorization; Detecting Malicious Web Infrastructure; Detecting Exploit Servers through Content Analysis; Topology-Based Detection of Dedicated Malicious Hosts; Detecting C2 Servers; Detection Based on Download Similarities; Crawlers; Detecting Malicious Servers with a Honeyclient; High Interaction versus Low Interaction; Capture-HPC: A High-Interaction Honeyclient; Thug: A Low-Interaction Honeyclient; Evading Honeyclients; Summary; Chapter 6 Writing Policies |
520 ## - SUMMARY, ETC. | |
Summary, etc | Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo. |
526 ## - STUDY PROGRAM INFORMATION NOTE | |
Department | Physical Science |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic information resources |
General subdivision | Access control. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS / Internet / Security |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS / Networking / Security |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS / Security / General |
Source of heading or term | bisacsh |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks -- Security measures. World Wide Web -- Security measures. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Network security. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
Source of heading or term | fast |
-- | (OCoLC)fst00872341 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
Source of heading or term | fast |
-- | (OCoLC)fst00872484 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic information resources |
General subdivision | Access control. |
Source of heading or term | fast |
-- | (OCoLC)fst00907296 |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
655 #0 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Clark, Gregory, |
Relator term | author. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Print version: |
Main entry heading | Li, Qing |
Title | Security Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges |
Place, publisher, and date of publication | Hoboken : Wiley,c2015 |
International Standard Book Number | 9781118896693 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://dx.doi.org/10.1002/9781119183617">http://dx.doi.org/10.1002/9781119183617</a> |
Public note | Wiley Online Library |
994 ## - | |
-- | 92 |
-- | DG1 |
No items available.