Security operations in practice
Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and develop a highly effec...
Saved in:
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Swindon, United Kingdom :
BCS, The Chartered Institute for IT,
2020.
|
Subjects: | |
ISBN: | 9781780175072 1780175078 9781780175065 |
Physical Description: | 1 online resource |
LEADER | 02304cam a2200361 i 4500 | ||
---|---|---|---|
001 | kn-on1142630119 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 200302s2020 enk o 001 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d N$T |d OCLCF |d BCSLD |d OCLCO |d OCLCQ |d OCLCO |d K6U |d OCLCQ |d UPM |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL |d OCLCQ |d OCLCO | ||
020 | |a 9781780175072 |q (electronic bk.) | ||
020 | |a 1780175078 |q (electronic bk.) | ||
020 | |z 9781780175065 | ||
035 | |a (OCoLC)1142630119 | ||
100 | 1 | |a Sheward, Mike, |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjyv4FGHTTB6CrQvCwgyJP | |
245 | 1 | 0 | |a Security operations in practice / |c Mike Sheward. |
264 | 1 | |a Swindon, United Kingdom : |b BCS, The Chartered Institute for IT, |c 2020. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Includes index. | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and develop a highly effective security operations team. This requires more than just purchasing a series of information security tools, plugging them in and hoping for the best. As you will learn, it's about hiring the right people to work together, understanding the business the team is working to protect, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats. | ||
590 | |a Knovel |b Knovel (All titles) | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Electronic information resources |x Access control. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpSOP00001/security-operations-in?kpromoter=marc |y Full text |