Home > General > Security Intelligence
18%
Security Intelligence

Security Intelligence

          
5
4
3
2
1

Available


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle.

About the Author

Qing Li is Chief Scientist and Vice President of Advanced Technologies for Blue Coat Systems, a worldwide provider of security and network systems. Qing has more than 20 years of technology experience and has spent the past 9+ years designing and developing industry leading technologies and products at Blue Coat Systems.



Table of Contents:
Foreword Preface Chapter 1 Fundamentals of Secure Proxies ·Security Must Protect and Empower Users ·The Birth of Shadow IT ·Internet of Things and Connected Consumer Appliances ·Conventional Security Solutions ·Traditional Firewalls: What Are Their Main Deficiencies? ·Firewall with DPI: A Better Solution? ·IDS/IPS and Firewall ·Unified Threat Management and Next]Generation Firewall ·Security Proxy--A Necessary Extension of the End Point ·Transaction]Based Processing ·The Proxy Architecture ·SSL Proxy and Interception ·Interception Strategies ·Certificates and Keys ·Certificate Pinning and OCSP Stapling ·SSL Interception and Privacy Chapter 2 Proxy Deployment Strategies and Challenges ·Definitions of Proxy Types: Transparent Proxy and Explicit Proxy ·Inline Deployment of Transparent Proxy: Physical Inline and Virtual Inline ·Physical Inline Deployment ·Virtual Inline Deployment ·Traffic Redirection Methods: WCCP and PBR ·LAN Port and WAN Port ·Forward Proxy and Reverse Proxy ·Challenges of Transparent Interception ·Directionality of Connections ·Maintaining Traffic Paths ·Avoiding Interception ·Asymmetric Traffic Flow Detection and Clustering ·Proxy Chaining Chapter 3 Proxy Policy Engine and Policy Enforcements ·Policy System Overview ·Conditions and Properties ·Policy Transaction ·Policy Ticket ·Policy Updates and Versioning System ·Security Implications ·Policy System in the Cloud Security Operation ·Policy Evaluation ·Policy Checkpoint ·Policy Execution Timing ·Revisiting the Proxy Interception Steps ·Enforcing External Policy Decisions Chapter 4 Malware and Malware Delivery Networks ·Cyber Warfare and Targeted Attacks ·Espionage and Sabotage in Cyberspace ·Industrial Espionage ·Operation Aurora Watering Hole Attack ·Breaching the Trusted Third Party ·Casting the Lures ·Spear Phishing ·Pharming ·Cross]Site Scripting ·Search Engine Poisoning ·Drive]by Downloads and the Invisible iframe ·Tangled Malvertising Networks ·Malware Delivery Networks ·Fast]Flux Networks ·Explosion of Domain Names ·Abandoned Sites and Domain Names ·Antivirus Software and End]Point Solutions -- The Losing Battle Chapter 5 Malnet Detection Techniques ·Automated URL Reputation System ·Creating URL Training Sets ·Extracting URL Feature Sets ·Classifier Training ·Dynamic Webpage Content Rating ·Keyword Extraction for Category Construction ·Keyword Categorization ·Detecting Malicious Web Infrastructure ·Detecting Exploit Servers through Content Analysis ·Topology]Based Detection of Dedicated Malicious Hosts ·Detecting C2 Servers ·Detection Based on Download Similarities ·Crawlers ·Detecting Malicious Servers with a Honey client ·High Interaction versus Low Interaction ·Capture]HPC: A High]Interaction Honey client ·Thug: A Low]Interaction Honey client ·Evading Honey clients Chapter 6 Writing Policies ·Overview of the ProxySG Policy Language ·Scenarios and Policy Implementation ·Web Access ·Access Logging ·User Authentication ·Safe Content Retrieval ·SSL Proxy ·Reverse Proxy Deployment ·DNS Proxy ·Data Loss Prevention ·E]mail Filtering ·A Primer on SMTP ·E]mail Filtering Techniques Chapter 7 The Art of Application Classification ·A Brief History of Classification Technology ·Signature Based Pattern Matching Classification ·Extracting Matching Terms -- Aho]Corasick Algorithm ·Prefix]Tree Signature Representation ·Manual Creation of Application Signatures ·Automatic Signature Generation ·Flow Set Construction ·Extraction of Common Terms ·Signature Distiller ·Considerations ·Machine Learning]Based Classification Technique ·Feature Selection ·Supervised Machine Learning Algorithms ·Naive Bayes Method ·Unsupervised Machine Learning Algorithms ·Expectation]Maximization ·K]Means Clustering ·Classifier Performance Evaluation ·Proxy versus Classifier Chapter 8 Retrospective Analysis ·Data Acquisition ·Logs and Retrospective Analysis ·Log Formats ·Log Management and Analysis ·Packet Captures ·Capture Points ·Capture Formats ·Capture a Large Volume of Data ·Data Indexing and Query ·B]tree Index ·B]tree Search ·B]tree Insertion ·Range Search and B+]tree ·Bitmap Index ·Bitmap Index Search ·Bitmap Index Compression ·Inverted File Index ·Inverted File ·Inverted File Index Query ·Inverted File Compression ·Performance of a Retrospective Analysis System ·Index Sizes ·Index Building Overhead ·Query Response Delay ·Scalability ·Notes on Building a Retrospective Analysis System ·MapReduce and Hadoop ·MapReduce for Parallel Processing ·Hadoop ·Open Source Data Storage and Management Solution ·Why a Traditional RDBMS Falls Short ·NoSQL and Search Engines ·NoSQL and Hadoop Chapter 9 Mobile Security ·Mobile Device Management or Lack Thereof ·Mobile Applications and Their Impact on Security ·Security Threats and Hazards in Mobile Computing ·Cross]Origin Vulnerability ·Near Field Communication ·Application Signing Transparency ·Library Integrity and SSL Verification Challenges ·Ad Fraud ·Research Results and Proposed Solutions ·Infrastructure]Centric Mobile Security Solution ·Towards the Seamless Integration of WiFi and Cellular Networks ·Security in the Network Summary Bibliography Index


Best Sellers



Product Details
  • ISBN-13: 9788126555895
  • Publisher: Wiley India Pvt Ltd
  • Binding: Paperback
  • No of Pages: 360
  • ISBN-10: 8126555890
  • Publisher Date: 01 Jun 2015
  • Language: English

Related Categories

Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Security Intelligence
Wiley India Pvt Ltd -
Security Intelligence
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security Intelligence

Required fields are marked with *





 
Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?

    Tag this Book




















    Read more
    Does your review contain spoilers?
     
    What type of reader best describes you?
    I agree to the terms & conditions
     
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!