Artboard 33 Artboard 16 Artboard 18 Artboard 15 Artboard 21 Artboard 1 Artboard 2 Artboard 5 Artboard 45 Artboard 45 Artboard 22 Artboard 9 Artboard 23 Artboard 17? Artboard 28 Artboard 43 Artboard 49 Artboard 47 Artboard 38 Artboard 32 Artboard 8 Artboard 22 Artboard 5 Artboard 25 Artboard 1 Artboard 42 Artboard 11 Artboard 41 Artboard 13 Artboard 23 Artboard 10 Artboard 4 Artboard 9 Artboard 20 Artboard 6 Artboard 11 Artboard 7 Artboard 3 Artboard 3 Artboard 12 Artboard 25 Artboard 34 Artboard 39 Artboard 24 Artboard 13 Artboard 19 Artboard 7 Artboard 24 Artboard 31 Artboard 4 Artboard 14 Artboard 27 Artboard 30 Artboard 36 Artboard 44 Artboard 12 Artboard 17 Artboard 17 Artboard 6 Artboard 27 Artboard 19 Artboard 30 Artboard 29 Artboard 29 Artboard 26 Artboard 18 Artboard 2 Artboard 20 Artboard 35 Artboard 15 Artboard 14 Artboard 48 Artboard 50 Artboard 26 Artboard 16 Artboard 40 Artboard 21 Artboard 29 Artboard 10 Artboard 37 Artboard 3 Artboard 3 Artboard 46 Artboard 8
e-book

Security Intelligence - A Practitioner's Guide to Solving Enterprise Security Challenges (Cód: 9306407)

Clark, Gregory; Li, Qing

Wiley (Digital)

Ooops! Este produto não está mais a venda.
Mas não se preocupe, temos uma versão atualizada para você.

Ooopss! Este produto está fora de linha, mas temos outras opções para você.
Veja nossas sugestões abaixo!

R$ 84,93 em até 2x de R$ 42,47 sem juros
Cartão Saraiva R$ 84,93 ou em até 4x de R$ 21,23 sem juros

Crédito:
Boleto:
Cartão Saraiva:

Total: R$0,00

Em até 2x sem juros de R$ 0,00


Security Intelligence - A Practitioner's Guide to Solving Enterprise Security Challenges

R$84,93

Descrição

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. You will learn about: Secure proxies ? the necessary extension of the endpoints Application identification and control ? visualize the threats Malnets ? where is the source of infection and who are the pathogens Identify the security breach ? who was the victim and what was the lure Security in Mobile computing ? SNAFU With this book, you will be able to: Identify the relevant solutions to secure the infrastructure Construct policies that provide flexibility to the users so to ensure productivity Deploy effective defenses against the ever evolving web threats Implement solutions that are compliant to relevant rules and regulations Offer insight to developers who are building new security solutions and products

Características

Produto sob encomenda Sim
Marca Wiley (Digital)
Cód. Barras 9781118896662
Acabamento ebook
Início da Venda 03/01/2016
Territorialidade Internacional
Formato Livro Digital Epub
Gratuito Não
Proteção Drm Sim
Número da edição 1
Idioma 337
Código do Formato Epub
Número de Páginas 360 (aproximado)
Ano da Publicação 115
Peso 0.00 Kg
AutorClark, Gregory; Li, Qing