por
Contos, Brian T.
Signatura topográfica preferida
658.478 P578 22
Fecha de publicación
2007
Resumen
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide.
Formato:
Recursos electrónicos
Relevancia:
43629.6211
por
Contos, Brian T.
Signatura topográfica preferida
005.8 22
Fecha de publicación
2006
Resumen
Packed with vivid real-life cases, this comprehensive book addresses the most difficult to manage and costly of all security threats: the insider.
Formato:
Recursos electrónicos
Relevancia:
41500.2852
Ver otros resultados de búsqueda
por
Mulder, Jeroen, author.
Signatura topográfica preferida
005.1068 23
Fecha de publicación
2021
Resumen
An architect’s guide to designing, implementing, and integrating DevOps in the enterprise Key Features Design a DevOps architecture that is aligned with the overall enterprise architecture Design systems that are ready for AIOps and make the move toward NoOps Architect and implement DevSecOps pipelines, securing the DevOps enterprise Book DescriptionDigital transformation is the new paradigm in enterprises, but the big question remains: is the enterprise ready for transformation using native technology embedded in Agile/DevOps? With this book, you'll see how to design, implement, and integrate DevOps in the enterprise architecture while keeping the Ops team on board and remaining resilient. The focus of the book is not to introduce the hundreds of different tools that are available for implementing DevOps, but instead to show you how to create a successful DevOps architecture. This book provides an architectural overview of DevOps, AIOps, and DevSecOps – the three domains that drive and accelerate digital transformation. Complete with step-by-step explanations of essential concepts, practical examples, and self-assessment questions, this DevOps book will help you to successfully integrate DevOps into enterprise architecture. You'll learn what AIOps is and what value it can bring to an enterprise. Lastly, you will learn how to integrate security principles such as zero-trust and industry security frameworks into DevOps with DevSecOps. By the end of this DevOps book, you'll be able to develop robust DevOps architectures, know which toolsets you can use for your DevOps implementation, and have a deeper understanding of next-level DevOps by implementing Site Reliability Engineering (SRE). What you will learn Create DevOps architecture and integrate it with the enterprise architecture Discover how DevOps can add value to the quality of IT delivery Explore strategies to scale DevOps for an enterprise Architect SRE for an enterprise as next-level DevOps Understand AIOps and what value it can bring to an enterprise Create your AIOps architecture and integrate it into DevOps Create your DevSecOps architecture and integrate it with the existing DevOps setup Apply zero-trust principles and industry security frameworks to DevOps Who this book is for This book is for enterprise architects and consultants who want to design DevOps systems for the enterprise. It provides an architectural overview of DevOps, AIOps, and DevSecOps. If you're looking to learn about the implementation of various tools within the DevOps toolchain in detail, this book is not for you.
Formato:
Recursos electrónicos
Relevancia:
1.6112
por
Gustin, Joseph F., 1947-
Signatura topográfica preferida
658.478 22
Fecha de publicación
2004
Resumen
Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks.
Formato:
Recursos electrónicos
Relevancia:
0.9673
por
Neagu, Adrian.
Signatura topográfica preferida
005.7585
Fecha de publicación
2012
Resumen
This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is for you. This book assumes you have a basic understanding of security concepts.
Formato:
Recursos electrónicos
Relevancia:
0.8896
por
Kahn, Miriam (Miriam B.), Author.
Signatura topográfica preferida
025.82 22
Fecha de publicación
2004
Formato:
Recursos electrónicos
Relevancia:
0.5323
por
Johnson, Mark, 1959-
Signatura topográfica preferida
658.478 23
Fecha de publicación
2013
Resumen
"Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far beyond enumerating past cases and summarising legal or regulatory requirements. He describes in plain, non-technical language how cyber crime has evolved and the nature of the very latest threats. He confronts issues that are not addressed by codified rules and practice guidelines, supporting this with over 30 valuable illustrations and tables. Written for the non-technical layman and the high tech risk manager alike, the book also explores countermeasures, penetration testing, best practice principles, cyber conflict and future challenges. A discussion of Web 2.0 risks delves into the very real questions facing policy makers, along with the pros and cons of open source data. In a chapter on Digital Intelligence readers are provided with an exhaustive guide to practical, effective and ethical online investigations. Cyber Crime, Security and Digital Intelligence is an important work of great relevance in today's interconnected world and one that nobody with an interest in either risk or technology should be without."--Unedited summary from book.
Formato:
Recursos electrónicos
Relevancia:
0.5320
Signatura topográfica preferida
613.6 22
Fecha de publicación
2005
Formato:
Recursos electrónicos
Relevancia:
0.4773
por
Oppliger, Rolf.
Signatura topográfica preferida
005.8 22
Fecha de publicación
2003
Formato:
Recursos electrónicos
Relevancia:
0.0857
por
Dent, Alexander W.
Signatura topográfica preferida
005.8 22
Fecha de publicación
2004
Formato:
Recursos electrónicos
Relevancia:
0.0833
por
Kouns, Barry.
Signatura topográfica preferida
005.8
Fecha de publicación
2011
Resumen
Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills.
Formato:
Recursos electrónicos
Relevancia:
0.0772
por
Shinder, Thomas W.
Signatura topográfica preferida
005.8 22
Fecha de publicación
2007
Resumen
Allows IT professionals to manage over 15 different firewall products.
Formato:
Recursos electrónicos
Relevancia:
0.0772
Limitar resultados de búsqueda
Limitado por: