{"id":13485,"date":"2016-10-18T13:00:01","date_gmt":"2016-10-18T16:00:01","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=13485"},"modified":"2016-10-18T09:53:21","modified_gmt":"2016-10-18T12:53:21","slug":"security-intelligence","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/security-intelligence\/","title":{"rendered":"Security Intelligence"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-13486\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2016\/10\/Security-Intelligence.jpg\" alt=\"Security Intelligence\" width=\"145\" height=\"182\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2016\/10\/Security-Intelligence.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2016\/10\/Security-Intelligence-120x150.jpg 120w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Qing Li, Gregory Clark<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Maison d&#8217;\u00e9dition\u00a0Wiley<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> Similar to unraveling a math word problem, Security Intelligence: A Practitioner&#8217;s Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. You will learn about:<\/p>\n<p>&#8211; Secure proxies \u2013 the necessary extension of the endpoints;<br \/>\n&#8211; Application identification and control \u2013 visualize the threats;<br \/>\n&#8211; Malnets \u2013 where is the source of infection and who are the pathogens;<br \/>\n&#8211; Identify the security breach \u2013 who was the victim and what was the lure;<br \/>\n&#8211; Security in Mobile computing \u2013 SNAFU.<\/p>\n<p>With this book, you will be able to:<\/p>\n<p>&#8211; Identify the relevant solutions to secure the infrastructure;<br \/>\n&#8211; Construct policies that provide flexibility to the users so to ensure productivity;<br \/>\n&#8211; Deploy effective defenses against the ever evolving web threats;<br \/>\n&#8211; Implement solutions that are compliant to relevant rules and regulations;<br \/>\n&#8211; Offer insight to developers who are building new security solutions and products.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Qing Li, Gregory Clark Maison d&#8217;\u00e9dition\u00a0Wiley R\u00e9sum\u00e9: Similar to unraveling a math word problem, Security Intelligence: A Practitioner&#8217;s Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents&hellip; <\/p>\n","protected":false},"author":3,"featured_media":13486,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,23,6],"tags":[],"class_list":["post-13485","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-gestao-da-seguranca-empresarial","category-livros"],"views":618,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/13485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=13485"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/13485\/revisions"}],"predecessor-version":[{"id":13487,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/13485\/revisions\/13487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/13486"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=13485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=13485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=13485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}