Security operations in practice

Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and develop a highly effec...

Full description

Saved in:
Bibliographic Details
Main Author: Sheward, Mike, (Author)
Format: eBook
Language: English
Published: Swindon, United Kingdom : BCS, The Chartered Institute for IT, 2020.
Subjects:
ISBN: 9781780175072
1780175078
9781780175065
Physical Description: 1 online resource

Cover

Table of contents

LEADER 02304cam a2200361 i 4500
001 kn-on1142630119
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 200302s2020 enk o 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d OCLCF  |d BCSLD  |d OCLCO  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ  |d UPM  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL  |d OCLCQ  |d OCLCO 
020 |a 9781780175072  |q (electronic bk.) 
020 |a 1780175078  |q (electronic bk.) 
020 |z 9781780175065 
035 |a (OCoLC)1142630119 
100 1 |a Sheward, Mike,  |e author.  |1 https://id.oclc.org/worldcat/entity/E39PCjyv4FGHTTB6CrQvCwgyJP 
245 1 0 |a Security operations in practice /  |c Mike Sheward. 
264 1 |a Swindon, United Kingdom :  |b BCS, The Chartered Institute for IT,  |c 2020. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and develop a highly effective security operations team. This requires more than just purchasing a series of information security tools, plugging them in and hoping for the best. As you will learn, it's about hiring the right people to work together, understanding the business the team is working to protect, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats. 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Electronic information resources  |x Access control. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpSOP00001/security-operations-in?kpromoter=marc  |y Full text