Security intelligence: a practitioner's guide to solving enterprise security challenges
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, IN
Wiley
2015
|
Schlagworte: | |
Online-Zugang: | BFB01 FCO01 FRO01 UBG01 UBR01 Volltext |
Beschreibung: | Includes bibliographical references and index Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781118896679 111889667X 9781118896662 1118896661 9781119183617 1119183618 9781118896693 1118896696 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043397685 | ||
003 | DE-604 | ||
005 | 20230517 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2015 |||| o||u| ||||||eng d | ||
020 | |a 9781118896679 |c electronic bk |9 978-1-118-89667-9 | ||
020 | |a 111889667X |c electronic bk |9 1-118-89667-X | ||
020 | |a 9781118896662 |c electronic bk |9 978-1-118-89666-2 | ||
020 | |a 1118896661 |c electronic bk |9 1-118-89666-1 | ||
020 | |a 9781119183617 |c electronic bk |9 978-1-119-18361-7 | ||
020 | |a 1119183618 |c electronic bk |9 1-119-18361-8 | ||
020 | |a 9781118896693 |9 978-1-118-89669-3 | ||
020 | |a 1118896696 |9 1-118-89669-6 | ||
020 | |a 9781118896693 |9 978-1-118-89669-3 | ||
024 | 7 | |a 10.1002/9781119183617 |2 doi | |
035 | |a (ZDB-35-WIC)ocn906699046 | ||
035 | |a (OCoLC)906699046 | ||
035 | |a (DE-599)BVBBV043397685 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 |a DE-522 |a DE-858 |a DE-355 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Li, Qing |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security intelligence |b a practitioner's guide to solving enterprise security challenges |c Qing Li, Gregory Clark |
264 | 1 | |a Indianapolis, IN |b Wiley |c 2015 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Computer networks / Security measures. World Wide Web / Security measures | |
650 | 4 | |a Computer science | |
650 | 4 | |a Network security | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Electronic information resources / Access control |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Electronic information resources / Access control | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | |a Electronic books | ||
689 | 0 | 0 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Clark, Gregory |e Sonstige |4 oth | |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC |a ZDB-35-UBC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028816269 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617 |l BFB01 |p ZDB-35-WEL |q BFB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617 |l FCO01 |p ZDB-35-WIC |q FCO_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617 |l UBR01 |p ZDB-35-UBC |q UBR EBS Auswahl 2022 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175980145672192 |
---|---|
any_adam_object | |
author | Li, Qing |
author_facet | Li, Qing |
author_role | aut |
author_sort | Li, Qing |
author_variant | q l ql |
building | Verbundindex |
bvnumber | BV043397685 |
collection | ZDB-35-WIC ZDB-35-UBC |
ctrlnum | (ZDB-35-WIC)ocn906699046 (OCoLC)906699046 (DE-599)BVBBV043397685 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04004nmm a2200757zc 4500</leader><controlfield tag="001">BV043397685</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230517 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118896679</subfield><subfield code="c">electronic bk</subfield><subfield code="9">978-1-118-89667-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111889667X</subfield><subfield code="c">electronic bk</subfield><subfield code="9">1-118-89667-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118896662</subfield><subfield code="c">electronic bk</subfield><subfield code="9">978-1-118-89666-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118896661</subfield><subfield code="c">electronic bk</subfield><subfield code="9">1-118-89666-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119183617</subfield><subfield code="c">electronic bk</subfield><subfield code="9">978-1-119-18361-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119183618</subfield><subfield code="c">electronic bk</subfield><subfield code="9">1-119-18361-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118896693</subfield><subfield code="9">978-1-118-89669-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118896696</subfield><subfield code="9">1-118-89669-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118896693</subfield><subfield code="9">978-1-118-89669-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119183617</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn906699046</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)906699046</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043397685</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Li, Qing</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security intelligence</subfield><subfield code="b">a practitioner's guide to solving enterprise security challenges</subfield><subfield code="c">Qing Li, Gregory Clark</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures. World Wide Web / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic information resources / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic information resources / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Clark, Gregory</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield><subfield code="a">ZDB-35-UBC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028816269</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="q">BFB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FCO_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-35-UBC</subfield><subfield code="q">UBR EBS Auswahl 2022</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043397685 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:54Z |
institution | BVB |
isbn | 9781118896679 111889667X 9781118896662 1118896661 9781119183617 1119183618 9781118896693 1118896696 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028816269 |
oclc_num | 906699046 |
open_access_boolean | |
owner | DE-861 DE-522 DE-858 DE-355 DE-BY-UBR |
owner_facet | DE-861 DE-522 DE-858 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-35-WIC ZDB-35-UBC UBG_PDA_WIC ZDB-35-WEL BFB_Kauf ZDB-35-WIC FCO_PDA_WIC_Kauf ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC ZDB-35-UBC UBR EBS Auswahl 2022 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Wiley |
record_format | marc |
spelling | Li, Qing Verfasser aut Security intelligence a practitioner's guide to solving enterprise security challenges Qing Li, Gregory Clark Indianapolis, IN Wiley 2015 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures. World Wide Web / Security measures Computer science Network security Computer networks / Security measures fast Computer security fast Electronic information resources / Access control fast Informatik Electronic information resources / Access control Computer networks / Security measures Computer security Risikomanagement (DE-588)4121590-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Electronic books Risikomanagement (DE-588)4121590-4 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Clark, Gregory Sonstige oth https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Li, Qing Security intelligence a practitioner's guide to solving enterprise security challenges COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures. World Wide Web / Security measures Computer science Network security Computer networks / Security measures fast Computer security fast Electronic information resources / Access control fast Informatik Electronic information resources / Access control Computer networks / Security measures Computer security Risikomanagement (DE-588)4121590-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4121590-4 (DE-588)4274324-2 |
title | Security intelligence a practitioner's guide to solving enterprise security challenges |
title_auth | Security intelligence a practitioner's guide to solving enterprise security challenges |
title_exact_search | Security intelligence a practitioner's guide to solving enterprise security challenges |
title_full | Security intelligence a practitioner's guide to solving enterprise security challenges Qing Li, Gregory Clark |
title_fullStr | Security intelligence a practitioner's guide to solving enterprise security challenges Qing Li, Gregory Clark |
title_full_unstemmed | Security intelligence a practitioner's guide to solving enterprise security challenges Qing Li, Gregory Clark |
title_short | Security intelligence |
title_sort | security intelligence a practitioner s guide to solving enterprise security challenges |
title_sub | a practitioner's guide to solving enterprise security challenges |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures. World Wide Web / Security measures Computer science Network security Computer networks / Security measures fast Computer security fast Electronic information resources / Access control fast Informatik Electronic information resources / Access control Computer networks / Security measures Computer security Risikomanagement (DE-588)4121590-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures. World Wide Web / Security measures Computer science Network security Computer networks / Security measures Computer security Electronic information resources / Access control Informatik Risikomanagement Computersicherheit |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183617 |
work_keys_str_mv | AT liqing securityintelligenceapractitionersguidetosolvingenterprisesecuritychallenges AT clarkgregory securityintelligenceapractitionersguidetosolvingenterprisesecuritychallenges |