Security intelligence: a practitioner's guide to solving enterprise security challenges
Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally acro...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Indianapolis, IN
Wiley
2015
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781118896693/?ar |
Zusammenfassung: | Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo. |
Beschreibung: | Includes bibliographical references and index. - Online resource; title from PDF title page (Ebsco, viewed April 13, 2015) |
Umfang: | 1 Online-Ressource |
ISBN: | 9781118896679 111889667X 9781118896662 1118896661 9781119183617 1119183618 1118896696 9781118896693 |
Internformat
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-108522865 | ||
003 | DE-627-1 | ||
005 | 20241001123219.0 | ||
007 | cr uuu---uuuuu | ||
008 | 241001s2015 xx |||||o 00| ||eng c | ||
020 | |a 9781118896679 |c electronic bk. |9 978-1-118-89667-9 | ||
020 | |a 111889667X |c electronic bk. |9 1-118-89667-X | ||
020 | |a 9781118896662 |c electronic bk. |9 978-1-118-89666-2 | ||
020 | |a 1118896661 |c electronic bk. |9 1-118-89666-1 | ||
020 | |a 9781119183617 |c electronic bk. |9 978-1-119-18361-7 | ||
020 | |a 1119183618 |c electronic bk. |9 1-119-18361-8 | ||
020 | |a 1118896696 |9 1-118-89669-6 | ||
020 | |a 9781118896693 |9 978-1-118-89669-3 | ||
020 | |a 9781118896693 |9 978-1-118-89669-3 | ||
035 | |a (DE-627-1)108522865 | ||
035 | |a (DE-599)KEP108522865 | ||
035 | |a (ORHE)9781118896693 | ||
035 | |a (DE-627-1)108522865 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Li, Qing |d 1971- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Security intelligence |b a practitioner's guide to solving enterprise security challenges |c Qing Li, Gregory Clark |
264 | 1 | |a Indianapolis, IN |b Wiley |c 2015 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from PDF title page (Ebsco, viewed April 13, 2015) | ||
520 | |a Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo. | ||
650 | 0 | |a Electronic information resources |x Access control | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 4 | |a Sources d'information électroniques ; Accès ; Contrôle | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Electronic information resources ; Access control | |
650 | 4 | |a Computers and IT | |
700 | 1 | |a Clark, Gregory |e VerfasserIn |4 aut | |
776 | 1 | |z 9781118896693 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781118896693 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781118896693/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-108522865 |
---|---|
_version_ | 1829007834204864512 |
adam_text | |
any_adam_object | |
author | Li, Qing 1971- Clark, Gregory |
author_facet | Li, Qing 1971- Clark, Gregory |
author_role | aut aut |
author_sort | Li, Qing 1971- |
author_variant | q l ql g c gc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)108522865 (DE-599)KEP108522865 (ORHE)9781118896693 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03120nam a22006492c 4500</leader><controlfield tag="001">ZDB-30-ORH-108522865</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241001123219.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241001s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118896679</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-89667-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111889667X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-89667-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118896662</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-89666-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118896661</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-89666-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119183617</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-18361-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119183618</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-18361-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118896696</subfield><subfield code="9">1-118-89669-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118896693</subfield><subfield code="9">978-1-118-89669-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118896693</subfield><subfield code="9">978-1-118-89669-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108522865</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP108522865</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781118896693</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108522865</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Li, Qing</subfield><subfield code="d">1971-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security intelligence</subfield><subfield code="b">a practitioner's guide to solving enterprise security challenges</subfield><subfield code="c">Qing Li, Gregory Clark</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from PDF title page (Ebsco, viewed April 13, 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic information resources</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sources d'information électroniques ; Accès ; Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic information resources ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and IT</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Clark, Gregory</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781118896693</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781118896693</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781118896693/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-108522865 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:36:35Z |
institution | BVB |
isbn | 9781118896679 111889667X 9781118896662 1118896661 9781119183617 1119183618 1118896696 9781118896693 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Wiley |
record_format | marc |
spelling | Li, Qing 1971- VerfasserIn aut Security intelligence a practitioner's guide to solving enterprise security challenges Qing Li, Gregory Clark Indianapolis, IN Wiley 2015 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from PDF title page (Ebsco, viewed April 13, 2015) Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo. Electronic information resources Access control Computer networks Security measures Computer security Sources d'information électroniques ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Electronic information resources ; Access control Computers and IT Clark, Gregory VerfasserIn aut 9781118896693 Erscheint auch als Druck-Ausgabe 9781118896693 |
spellingShingle | Li, Qing 1971- Clark, Gregory Security intelligence a practitioner's guide to solving enterprise security challenges Electronic information resources Access control Computer networks Security measures Computer security Sources d'information électroniques ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Electronic information resources ; Access control Computers and IT |
title | Security intelligence a practitioner's guide to solving enterprise security challenges |
title_auth | Security intelligence a practitioner's guide to solving enterprise security challenges |
title_exact_search | Security intelligence a practitioner's guide to solving enterprise security challenges |
title_full | Security intelligence a practitioner's guide to solving enterprise security challenges Qing Li, Gregory Clark |
title_fullStr | Security intelligence a practitioner's guide to solving enterprise security challenges Qing Li, Gregory Clark |
title_full_unstemmed | Security intelligence a practitioner's guide to solving enterprise security challenges Qing Li, Gregory Clark |
title_short | Security intelligence |
title_sort | security intelligence a practitioner s guide to solving enterprise security challenges |
title_sub | a practitioner's guide to solving enterprise security challenges |
topic | Electronic information resources Access control Computer networks Security measures Computer security Sources d'information électroniques ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Electronic information resources ; Access control Computers and IT |
topic_facet | Electronic information resources Access control Computer networks Security measures Computer security Sources d'information électroniques ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Electronic information resources ; Access control Computers and IT |
work_keys_str_mv | AT liqing securityintelligenceapractitionersguidetosolvingenterprisesecuritychallenges AT clarkgregory securityintelligenceapractitionersguidetosolvingenterprisesecuritychallenges |