Full description not available
B**M
A must read for IT Security Professionals of all levels
Qing knows - first hand - how most companies approach IT Security today. He has identified weaknesses in that most-common approach, and in this book he outlines what needs to be done to build a secure infrastructure to protect against and mitigate the damage done by today's threats. Of most importance, the book also outlines changes needed in a company's approach to IT Security. (Hint: If you're a C-, VP-, or Managerial-Level Security professional, your takeaways from Chapter 8 alone could help save your job as well as your company's reputation, when you next get breached.) The book also outlines the advantages and complications behind the different deployment methodologies it outlines, which is important.This book is a high-level view towards implementing security infrastructure and policy that's able to deal with today's advanced threats. It does dip into the Bayesian mathematics behind how malnets and applications are identified. It also dips a little deep on proxy policy, but don't be intimidated or put off.While IT Security Ops Teams will get the most value out of this book, this is a quick read that should be a part of every IT Security Professional's library, no matter your position level or experience in the field.
B**R
Good overall security manual
Good overall security manual. As a frontline designer/deployer of security solutions I can say that the book is definitely on the strategic side rather than purely technical. Although of course there is some in depth technical information included, particularly about the why's of some technologies being better at defending against certain types of attacks.The material is well covered, in depth and clearly written. The policy examples are gold, even if you're not using a bluecoat device. This is because they focus on looking at the traffic, deciding what is good/bad and focusing on how to write rules that will most accurately classify it and take action. This is a CRITICAL skill and mindset for anyone who really wants to understand what they're doing vs. relying completely on pre-written vendor rules/signatures to do the work.Overall a nice book to have in your security library,Qing certainly is in love with proxies though, haha. Not that there is anything wrong with that as they have a very prominent place in today's security architectures, but you'd expect that given his employer (Bluecoat) and work. You have to read the book with that in mind.
H**C
Must have summary describing security issues and the role of proxies in their mitigation
This is a well written book that provides a well rounded survey on dealing with a variety of enterprise security issues such as search engine poisoning, malware delivery networks, etc. and the role of a proxies in establishing or increasing an enterprise's security posture. This book manages to strike a fine balance between providing enough material for each of the subject areas without getting excessively bogged down in details. Indeed so much material is presented that value is obtained from doing a second read to fully integrate all the information presented. Qing concisely describes the processes and strategies employed by authors of security attacks while simultaneously articulating mitigation strategies. This approach made reading the subject material even more interesting since it describes the arms race currently under way between safe and unsafe portions of the Internet.
R**Y
The Missing Manual for Security!
This is an excellent book if you are wanting to understand and/or re-evaluate your security infrastructure investments. It provides some needed challenges to conventional security methods and tools. The key take aways for me are the need for Visibility and Intelligence, How to get in the right place and What to do once you get there. I personally appreciate the authors taking on such a timely but technically challenging subject in a very practical and readable way. GREAT JOB!
B**Y
Security Intelligence is a must read for anyone who is serious about securing their network.
Security Intelligence is a great mix between a technical deep dive and business best practices manual. Security Intelligence takes the real world experience from the authors and compiles an easy to read book with great business value.The book starts with fundamental IT Security concepts like Proxy, Firewall, and IPS, then delves into newer ideas about malware detection, retrospective analysis, and mobile security.Security Intelligence is a must read for anyone who is serious about securing their network.
Z**.
Five Stars
good product and fast shipping
P**K
Good book on enterprise security
This is an excellent book for those of us in IT who are concerned with security. What most impressed me about this book, is the author does a great job of describing why some simple security measures, like firewalls, while important are not enough for todays potential threats. I especially enjoyed they emphasis on proxies and unified gateways as a means of strengthening security posture. The book also does a good job of given what I would call an executive summary of security policy, meaning its aimed at higher level but perhaps less technical execs.
Trustpilot
1 week ago
5 days ago