Keyword : Category :
 
 
 
 
Windows
Unix
Php and mysql
Linux
Java
Mobile programming
Certification
Asterisk
Python
Autocad
3d-animation
Hacks
Programming
Hardware
Networking
Web design
Multimedia - graphics
Simple steps
Dummies
.net programming
Oracle
Sql server
Operating system
Telecommunications
Microsoft
Office
Web development
Cisco
Graphics
C sharp
Software development
Database
Computer science
Uml
Security
General
Cms
Mac
Android
 
 
Email:
 
 
No bestsellers available!
 
Book details / order
SECURITY INTELLIGENCE
Security intelligence: a practitioner's guide to solving enterprise security challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. foreword preface chapter 1 fundamentals of secure proxies security must protect and empower users the birth of shadow it internet of things and connected consumer appliances conventional security solutions traditional firewalls: what are their main deficiencies? firewall with dpi: a better solution? ids/ips and firewall unified threat management and next]generation firewall security proxy--a necessary extension of the end point transaction]based processing the proxy architecture ssl proxy and interception interception strategies certificates and keys certificate pinning and ocsp stapling ssl interception and privacy chapter 2 proxy deployment strategies and challenges definitions of proxy types: transparent proxy and explicit proxy inline deployment of transparent proxy: physical inline and virtual inline physical inline deployment virtual inline deployment traffic redirection methods: wccp and pbr lan port and wan port forward proxy and reverse proxy challenges of transparent interception directionality of connections maintaining traffic paths avoiding interception asymmetric traffic flow detection and clustering proxy chaining chapter 3 proxy policy engine and policy enforcements policy system overview conditions and properties policy transaction policy ticket policy updates and versioning system security implications policy system in the cloud security operation policy evaluation policy checkpoint policy execution timing revisiting the proxy interception steps enforcing external policy decisions chapter 4 malware and malware delivery networks cyber warfare and targeted attacks espionage and sabotage in cyberspace industrial espionage operation aurora watering hole attack breaching the trusted third party casting the lures spear phishing pharming cross]site scripting search engine poisoning drive]by downloads and the invisible iframe tangled malvertising networks malware delivery networks fast]flux networks explosion of domain names abandoned sites and domain names antivirus software and end]point solutions -- the losing battle chapter 5 malnet detection techniques automated url reputation system creating url training sets extracting url feature sets classifier training dynamic webpage content rating keyword extraction for category construction keyword categorization detecting malicious web infrastructure detecting exploit servers through content analysis topology]based detection of dedicated malicious hosts detecting c2 servers detection based on download similarities crawlers detecting malicious servers with a honey client high interaction versus low interaction capture]hpc: a high]interaction honey client thug: a low]interaction honey client evading honey clients chapter 6 writing policies overview of the proxysg policy language scenarios and policy implementation web access access logging user authentication safe content retrieval ssl proxy reverse proxy deployment dns proxy data loss prevention e]mail filtering a primer on smtp e]mail filtering techniques chapter 7 the art of application classification a brief history of classification technology signature based pattern matching classification extracting matching terms -- aho]corasick algorithm prefix]tree signature representation manual creation of application signatures automatic signature generation flow set construction extraction of common terms signature distiller considerations machine learning]based classification technique feature selection supervised machine learning algorithms naive bayes method unsupervised machine learning algorithms expectation]maximization k]means clustering classifier performance evaluation proxy versus classifier chapter 8 retrospective analysis data acquisition logs and retrospective analysis log formats log management and analysis packet captures capture points capture formats capture a large volume of data data indexing and query b]tree index b]tree search b]tree insertion range search and b+]tree bitmap index bitmap index search bitmap index compression inverted file index inverted file inverted file index query inverted file compression performance of a retrospective analysis system index sizes index building overhead query response delay scalability notes on building a retrospective analysis system mapreduce and hadoop mapreduce for parallel processing hadoop open source data storage and management solution why a traditional rdbms falls short nosql and search engines nosql and hadoop chapter 9 mobile security mobile device management or lack thereof mobile applications and their impact on security security threats and hazards in mobile computing cross]origin vulnerability near field communication application signing transparency library integrity and ssl verification challenges ad fraud research results and proposed solutions infrastructure]centric mobile security solution towards the seamless integration of wifi and cellular networks security in the network summary bibliography index

Author : Qing li
Publication : Wiley
Isbn : 9788126555895
Store book number : 107
NRS 960.00
  
Order This Book
*Marked Field Is Necessary
Your Name: *
Your Address:
Your Email: *
Your Cell Phone:
Your Work Phone:
Quantity: *
Total:
Message (if any)
Security code: *
Case Sensitive
 
 
Packt publication
Microsoft press
Wrox
Bpb
Phi
Dreamtech press
Sybex
Wiley
Tata
Oreilly
Macmilan
Vikas
Apress
Spd
Pearson
Cambridge
Oxford
Idg
Charles river media
Murach
Niit
Black book
Bible
Elsevier
Sk kataria
Pragmatic bookshelf
Fusion books
 
 
HEAD FIRST SWIFT: A LEARNER'S GUIDE TO PROGRAMMING WITH SWIFT, 1ST EDITION
NRS 1920.00
 
 
Professional ASP.NET MVC 4
Mastering Microsoft Exchange ...
Android Hacker's Handbook
CCNA Cisco Certified Network ...
Windows Phone 7 Application ...
Beginning Drupal (Wrox Progr ...
Troubleshooting Windows 7 In ...
 More>>
 
All Right Reserved © bookplus.com.np 2008