Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9780128021453
    Language: English
    Pages: 1 online resource (200 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way. Provides a roadmap and direction on how to build an intelligence-led information security program to protect your company. Learn how to understand your network through logs and client monitoring, so you can effectively evaluate threat intelligence. Learn how to use popular tools such as BIND, SNORT, squid, STIX, TAXII, CyBox, and splunk to conduct network intelligence.
    Note: Online resource; Title from title page (viewed December 10, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: Machine learning ; Artificial intelligence ; Computer networks ; Security measures ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: For security professionals seeking reliable ways to combat persistent threats to their networks, there's encouraging news. Tools that employ AI and machine learning have begun to replace the older rules- and signature-based tools that can no longer combat today's sophisticated attacks. In this ebook, Oracle's Laurent Gil and Recorded Future's Allan Liska look at the strengths (and limitations) of AI- and ML-based security tools for dealing with today's threat landscape. This high-level overview demonstrates how these new tools use AI and ML to quickly identify threats, connect attack patterns, and allow operators and analysts to focus on their core mission. You'll also learn how managed security service providers (MSSPs) use AI and ML to identify patterns from across their customer base. This ebook explains: Why rules-based, signature-based, and firewall solutions have fallen short How automated bots enable cybercriminals and nation-state actors to attack your network The evolution of the botnet: how threat actors constantly change their attack strategy How AI and ML techniques in web applications help you observe, quantify, and classify inbound requests How to detect insider threats and advanced persistent threat actors with AI and ML tools Case studies that show how a media company, an airline, and a university use AL and ML in security
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed March 19, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: Computer networks ; Security measures ; Computer crimes ; Investigation ; Business enterprises ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Many organizations are discovering that traditional security tools alone aren't enough to protect their networks. In this practical report, you'll explore threat intelligence, a method for collecting information on various forms of malicious cyber activity as a way to bolster your in-house measures. Author Allan Liska, security architect at Recorded Future, takes you through the threat intelligence cycle and explains what is required to put together an effective threat intelligence program for your company. Backed by case studies of several organizations that have successfully implemented these initiatives, this report explains that threat intelligence is actionable external information that, when correlated against internal data, can be used to detect or prevent an attack. You'll understand how threat intelligence enables you to stay abreast of current as well as future threats. Understand exactly what threat intelligence is, and how to correlate it to internal events Collect and apply threat intelligence, gain feedback, and incorporate feedback into your own threat intelligence cycle Examine tactical, operational, and strategic intelligence, and ensure that the right information gets to the right people Get practical examples from several organizations that have correctly implemented threat intelligence programs
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed January 10, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer security ; Computer crimes ; Electronic books ; Electronic books ; local
    Abstract: The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed November 29, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (56 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If you’re considering a multicloud approach to host applications, you’re in good company. According to a recent survey, 42% of the world’s organizations have adopted this strategy. But there are significant challenges and complexities to overcome. This practical report walks you through the pros and cons of migrating to these environments, particularly for securing your applications. Cybersecurity experts Laurent Gil and Allan Liska show you how to orchestrate and manage multicloud environments, including edge technologies designed to secure and protect your environment. Managers and leaders will learn methods for distributing workloads across cloud providers as well as ways to avoid potential pitfalls when pursuing this strategy. Understand the benefits of adopting a multicloud architecture—along with the trade-offs and short-term costs Learn how orchestration lets you manage dozens of applications across thousands of containers in a multicloud environment Explore ways to apply a consistent security policy across all cloud platforms Implement layered security that includes vulnerability scanning, API gateway deployment, and web application firewalls Delve into specific use cases for delivering web application security across all cloud providers
    Note: Online resource; Title from title page (viewed November 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvii, 422 p. , ill. ; , 24 cm
    Keywords: Apache (Computer file : Apache Group) ; Web servers ; Computer programs ; Electronic books ; local
    Abstract: The Apache Web server runs more than 55 percent of the sites on the Internet, making it the number one Web server, and more widely used than all other Web server combined. Apache 2.0 is the first majore release of Apache since its inception, and represents a complete change in Apache architecture--one requiring that administrators and developers learn new procedures and techniques for configuring and maintaining the Apache server. Apache Administrator's Handbook is a practical hands-on guide to the installation, configuration, and administration of the Apache Web server. It will show you how to build and configure Apache with the features and modules you need, how to seucre the server, how to interpret log files, and how to tune the server's performance. While aimed primarily at Apache server administrators, the book also contains information for developers interested in building dynamic Web sites on top of the Apache server using either CGI or mod_perl.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Tecniche nuove
    ISBN: 9788848134620 , 8848134629
    Language: Undetermined
    Pages: 1 online resource
    Note: Title from content provider
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 391 p. , ill. ; , 25 cm
    Series Statement: Prentice Hall PTR series in computer networking and distributed systems
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Enterprise security for real netadmins in the real worldThis book shows how to secure an enterprise network in the real world--when you're on the front lines, constantly under attack, and you don't always get the support you need. Symantec security engineer and former UUNet network architect Allan Liska addresses every facet of network security, from risk profiling through access control, Web/email security through day-to-day monitoring. He systematically identifies today's most widespread security mistakes and vulnerabilities--and offers realistic solutions you can begin implementing right away.Coverage Includes: Quantifying security risks and "selling" security throughout the organization Defining security models that reflect your company's philosophy Translating your security model into effective, enforceable policies Making your routers and switches your first lines of network defense Controlling access via authentication, authorization, and accounting Configuring secure VPNs and remote access Securing wireless LANs and WANs Establishing a DMZ between your network and the public Internet Securing Web/application servers, DNS servers, email servers, and file/print servers Implementing effective day-to-day network security administration, monitoring, and logging Responding to attacks: detect, isolate, halt, report, and prosecute Liska integrates these techniques in an end-to-end case study, showing you how to redesign an insecure enterprise network for maximum security--one step at a time.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: First edition.
    Keywords: Web applications ; Security measures ; Data protection ; Malware (Computer software) ; Electronic books ; Electronic books ; local
    Abstract: Most enterprise applications today live on the network edge, right where attackers are focusing increasing attention and activities to gain access to your data. This practical report helps analyze your company's vulnerabilities to common web application security threats, such as malicious bots, application exploits, API attacks, DDoS attacks, and server-based malware. You'll learn proactive steps to implement services and strategies designed to protect online enterprise applications at the user edge. Authors Stephen Gates, edge security evangelist and SME at Oracle Dyn, and Allan Liska, threat intelligence architect at Recorded Future, explore how advanced DNS services, web application firewall (WAF) services, bot management, API security, DDoS defenses, and malware protection solutions combine to protect your sites and applications from malicious attacks and bad actors. Understand the current web application threats landscape Prioritize availability, confidentiality, and integrity and manage associated security risks Explore the role of DNS in maintaining availability Learn how to approach cloud-based web application security Plan your strategy with a web application security checklist
    Note: Description based on online resource; title from title page (Safari, viewed April 10, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Article
    Article
    Associated volumes
    In:  Tourism ; Vol. 4: New directions and alternative tourism (2004), Seite 65-82 | year:2004 | pages:65-82
    ISBN: 0415243769
    Language: Undetermined
    Titel der Quelle: Tourism ; Vol. 4: New directions and alternative tourism
    Publ. der Quelle: London [u.a.] : Routledge, 2004
    Angaben zur Quelle: (2004), Seite 65-82
    Angaben zur Quelle: year:2004
    Angaben zur Quelle: pages:65-82
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...