Muutke küpsiste eelistusi

E-raamat: Security Operations in Practice

  • Formaat: 270 pages
  • Ilmumisaeg: 29-Feb-2020
  • Kirjastus: BCS, The Chartered Institute for IT
  • Keel: eng
  • ISBN-13: 9781780175089
  • Formaat - EPUB+DRM
  • Hind: 38,89 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 270 pages
  • Ilmumisaeg: 29-Feb-2020
  • Kirjastus: BCS, The Chartered Institute for IT
  • Keel: eng
  • ISBN-13: 9781780175089

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls.

This book walks you through how to establish and grow a strong security operations team, including hiring the right people, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats.

Arvustused

'Mike masterfully combines a coverage of the fundamental building blocks of a security operations program with the tactical insight he has gained from his experience in the trenches. This book holds valuable insights for both the budding security engineer and the seasoned veteran.' -- Chad Butler * Director - Application Security, Disney * 'A good read and food for thought for Security Operations professionals.' -- David King * Regional Information Security Officer EMEA, Omnicom Media Group * 'Beginners and veterans alike will learn from a professional who has clearly earned his wisdom. This sensible and practical guide to security operations is on my desktop, not in my bookshelf.' -- Jeff Costlow * Deputy CISO, ExtraHop Networks *

  1. Introduction
  2. Establishing A Security Operations Team
  3. Monitoring Networks and Clouds
  4. Managing Endpoint Devices
  5. Protecting Data
  6. Identity and Access Management
  7. Incident Detection and Response
  8. Vulnerability Management
  9. Building Relationships and Trust
  10. Beyond the Enterprise
  11. Red Teaming and Threat Hunting
  12. Building Bespoke Tools
  13. Physical Security
  14. Conclusion
Mike Sheward is Chief Information Security Officer at Amperity and runs a digital investigation consultancy, Secure Being LLC. He has worked in information security in the UK and USA. Mike has written two books, 'Digital Forensic Diaries' and 'Hands-On Incident Response and Digital Forensics.'