Advertisement
gartner attack surface management magic quadrant: Cyber Crime Investigator's Field Guide Bruce Middleton, 2022-06-22 Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)—all this and more is discussed in Cyber Crime Investigator’s Field Guide, Third Edition. Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be all the more enhanced to protect our electronic environment. Many laws, rules, and regulations have been implemented over the past few decades that have provided our law enforcement community and legal system with the teeth needed to take a bite out of cybercrime. But there is still a major need for individuals and professionals who know how to investigate computer network security incidents and can bring them to a proper resolution. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. The third edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, where, what, when, why, and how in the investigation of cybercrime. Features New focus area on rail transportation, OSINT, medical devices, and transhumanism / robotics Evidence collection and analysis tools Covers what to do from the time you receive the call, arrival on site, chain of custody, and more This book offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, Linux commands, Cisco firewall commands, port numbers, and more. |
gartner attack surface management magic quadrant: Azure Arc Systems Management Ramona Maxwell, |
gartner attack surface management magic quadrant: Identity Attack Vectors Morey J. Haber, Darran Rolls, 2019-12-17 Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory initiatives. As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security. Managing accounts, credentials, roles, certification, and attestation reporting for all resources is now a security and compliance mandate. When identity theft and poor identity management is leveraged as an attack vector, risk and vulnerabilities increase exponentially. As cyber attacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities, to conduct their malicious activities through privileged attacks and asset vulnerabilities. Identity Attack Vectors details the risks associated with poor identity management practices, the techniques that threat actors and insiders leverage, and the operational best practices that organizations should adopt to protect against identity theft and account compromises, and to develop an effective identity governance program. What You Will Learn Understand the concepts behind an identity and how their associated credentials and accounts can be leveraged as an attack vector Implement an effective Identity Access Management (IAM) program to manage identities and roles, and provide certification for regulatory compliance See where identity management controls play a part of the cyber kill chain and how privileges should be managed as a potential weak link Build upon industry standards to integrate key identity management technologies into a corporate ecosystem Plan for a successful deployment, implementation scope, measurable risk reduction, auditing and discovery, regulatory reporting, and oversight based on real-world strategies to prevent identity attack vectors Who This Book Is For Management and implementers in IT operations, security, and auditing looking to understand and implement an identity access management program and manage privileges in these environments |
gartner attack surface management magic quadrant: Privileged Attack Vectors Morey J. Haber, 2020-06-13 See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today’s environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. There is no one solution or strategy to provide the protection you need against all vectors and stages of an attack. And while some new and innovative products will help protect against or detect against a privilege attack, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. What You Will Learn Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and monitoring strategies to mitigate privilege threats and risk Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journeyDevelop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems |
gartner attack surface management magic quadrant: Research Anthology on Business Aspects of Cybersecurity Management Association, Information Resources, 2021-10-29 Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be difficult for businesses as there are so many moving parts to contend with, but remaining vigilant and having protective measures and training in place is essential for a successful company. The Research Anthology on Business Aspects of Cybersecurity considers all emerging aspects of cybersecurity in the business sector including frameworks, models, best practices, and emerging areas of interest. This comprehensive reference source is split into three sections with the first discussing audits and risk assessments that businesses can conduct to ensure the security of their systems. The second section covers training and awareness initiatives for staff that promotes a security culture. The final section discusses software and systems that can be used to secure and manage cybersecurity threats. Covering topics such as audit models, security behavior, and insider threats, it is ideal for businesses, business professionals, managers, security analysts, IT specialists, executives, academicians, researchers, computer engineers, graduate students, and practitioners. |
gartner attack surface management magic quadrant: Cybersecurity Career Master Plan Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams, 2021-09-13 Start your Cybersecurity career with expert advice on how to get certified, find your first job, and progress Purchase of the print or Kindle book includes a free eBook in PDF format Key Features Learn how to follow your desired career path that results in a well-paid, rewarding job in cybersecurity Explore expert tips relating to career growth and certification options Access informative content from a panel of experienced cybersecurity experts Book Description Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started. This book is designed by leading industry experts to help you enter the world of cybersecurity with confidence, covering everything from gaining the right certification to tips and tools for finding your first job. The book starts by helping you gain a foundational understanding of cybersecurity, covering cyber law, cyber policy, and frameworks. Next, you'll focus on how to choose the career field best suited to you from options such as security operations, penetration testing, and risk analysis. The book also guides you through the different certification options as well as the pros and cons of a formal college education versus formal certificate courses. Later, you'll discover the importance of defining and understanding your brand. Finally, you'll get up to speed with different career paths and learning opportunities. By the end of this cyber book, you will have gained the knowledge you need to clearly define your career path and develop goals relating to career progression. What you will learn Gain an understanding of cybersecurity essentials, including the different frameworks and laws, and specialties Find out how to land your first job in the cybersecurity industry Understand the difference between college education and certificate courses Build goals and timelines to encourage a work/life balance while delivering value in your job Understand the different types of cybersecurity jobs available and what it means to be entry-level Build affordable, practical labs to develop your technical skills Discover how to set goals and maintain momentum after landing your first cybersecurity job Who this book is for This book is for college graduates, military veterans transitioning from active service, individuals looking to make a mid-career switch, and aspiring IT professionals. Anyone who considers cybersecurity as a potential career field but feels intimidated, overwhelmed, or unsure of where to get started will also find this book useful. No experience or cybersecurity knowledge is needed to get started. |
gartner attack surface management magic quadrant: The Lean Approach to Digital Transformation Yves Caseau, 2022-05-01 The Lean Approach to Digital Transformation: From Customer to Code and From Code to Customer is organized into three parts that expose and develop the three capabilities that are essential for a successful digital transformation: 1. Understanding how to co-create digital services with users, whether they are customers or future customers. This ability combines observation, dialogue, and iterative experimentation. The approach proposed in this book is based on the Lean Startup approach, according to an extended vision that combines Design Thinking and Growth Hacking. Companies must become truly customer-centric, from observation and listening to co-development. The revolution of the digital age of the 21st century is that customer orientation is more imperative -- the era of abundance, usages rate of change, complexity of experiences, and shift of power towards communities -- are easier, using digital tools and digital communities. 2. Developing an information system (IS) that is the backbone of the digital transformation – called “exponential information system” to designate an open IS (in particular on its borders), capable of interfacing and combining with external services, positioned as a player in software ecosystems and built for processing scalable and dynamic data flows. The exponential information system is constantly changing and it continuously absorbs the best of information processing technology, such as Artificial Intelligence and Machine Learning. 3. Building software “micro-factories” that produce service platforms, which are called “Lean software factories.” This “software factory” concept covers the integration of agile methods, tooling and continuous integration and deployment practices, a customer-oriented product approach, and a platform approach based on modularity, as well as API-based architecture and openness to external stakeholders. This software micro-factory is the foundation that continuously produces and provides constantly evolving services. These three capabilities are not unique or specific to this book, they are linked to other concepts such as agile methods, product development according to lean principles, software production approaches such as CICD (continuous integration and deployment) or DevOps. This book weaves a common frame of reference for all these approaches to derive more value from the digital transformation and to facilitate its implementation. The title of the book refers to the “lean approach to digital transformation” because the two underlying frameworks, Lean Startup and Lean Software Factory, are directly inspired by Lean, in the sense of the Toyota Way. The Lean approach is present from the beginning to the end of this book -- it provides the framework for customer orientation and the love of a job well done, which are the conditions for the success of a digital transformation. |
gartner attack surface management magic quadrant: Research Methods for Cyber Security Thomas W. Edgar, David O. Manz, 2017-04-19 Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. - Presents research methods from a cyber security science perspective - Catalyzes the rigorous research necessary to propel the cyber security field forward - Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage |
gartner attack surface management magic quadrant: Ten Strategies of a World-Class Cybersecurity Operations Center Carson Zimmerman, 2014-07-01 Ten Strategies of a World-Class Cyber Security Operations Center conveys MITRE's accumulated expertise on enterprise-grade computer network defense. It covers ten key qualities of leading Cyber Security Operations Centers (CSOCs), ranging from their structure and organization, to processes that best enable smooth operations, to approaches that extract maximum value from key CSOC technology investments. This book offers perspective and context for key decision points in structuring a CSOC, such as what capabilities to offer, how to architect large-scale data collection and analysis, and how to prepare the CSOC team for agile, threat-based response. If you manage, work in, or are standing up a CSOC, this book is for you. It is also available on MITRE's website, www.mitre.org. |
gartner attack surface management magic quadrant: Hacking Multifactor Authentication Roger A. Grimes, 2020-09-28 Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You’ll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. Learn how different types of multifactor authentication work behind the scenes See how easy it is to hack MFA security solutions—no matter how secure they seem Identify the strengths and weaknesses in your (or your customers’) existing MFA security and how to mitigate Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking. |
gartner attack surface management magic quadrant: Insider Attack and Cyber Security Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, Sean W. Smith, 2008-08-29 This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. The book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and a range of topics from critical IT infrastructure to insider threats. In some ways, the insider problem is the ultimate security problem. |
gartner attack surface management magic quadrant: Security Metrics Andrew Jaquith, 2007-03-26 The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization’s unique requirements. You’ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management’s quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith’s extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You’ll learn how to: • Replace nonstop crisis response with a systematic approach to security improvement • Understand the differences between “good” and “bad” metrics • Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk • Quantify the effectiveness of security acquisition, implementation, and other program activities • Organize, aggregate, and analyze your data to bring out key insights • Use visualization to understand and communicate security issues more clearly • Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources • Implement balanced scorecards that present compact, holistic views of organizational security effectiveness |
gartner attack surface management magic quadrant: Key Issues in Organizational Communication Dennis Tourish, Owen Hargie, 2004 Exploring key issues in communication and their impacts on organizational outcomes and management theory, this book considers the important changes in technology and globalization in the context of communications. |
gartner attack surface management magic quadrant: Microsoft Azure Security Center Yuri Diogenes, Tom Shinder, 2018-06-04 Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center’s full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You’ll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you’ll learn how to save hours, days, or even weeks by solving problems in most efficient, reliable ways possible. Two of Microsoft’s leading cloud security experts show how to: • Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management • Master a new security paradigm for a world without traditional perimeters • Gain visibility and control to secure compute, network, storage, and application workloads • Incorporate Azure Security Center into your security operations center • Integrate Azure Security Center with Azure AD Identity Protection Center and third-party solutions • Adapt Azure Security Center’s built-in policies and definitions for your organization • Perform security assessments and implement Azure Security Center recommendations • Use incident response features to detect, investigate, and address threats • Create high-fidelity fusion alerts to focus attention on your most urgent security issues • Implement application whitelisting and just-in-time VM access • Monitor user behavior and access, and investigate compromised or misused credentials • Customize and perform operating system security baseline assessments • Leverage integrated threat intelligence to identify known bad actors |
gartner attack surface management magic quadrant: Security Information and Event Management (SIEM) Implementation David R. Miller, Shon Harris, Allen Harper, Stephen VanDyke, Chris Blask, 2010-11-05 Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts. The book explains how to implement SIEM products from different vendors, and discusses the strengths, weaknesses, and advanced tuning of these systems. You’ll also learn how to use SIEM capabilities for business intelligence. Real-world case studies are included in this comprehensive resource. Assess your organization’s business models, threat models, and regulatory compliance requirements Determine the necessary SIEM components for small- and medium-size businesses Understand SIEM anatomy—source device, log collection, parsing/normalization of logs, rule engine, log storage, and event monitoring Develop an effective incident response program Use the inherent capabilities of your SIEM system for business intelligence Develop filters and correlated event rules to reduce false-positive alerts Implement AlienVault’s Open Source Security Information Management (OSSIM) Deploy the Cisco Monitoring Analysis and Response System (MARS) Configure and use the Q1 Labs QRadar SIEM system Implement ArcSight Enterprise Security Management (ESM) v4.5 Develop your SIEM security analyst skills |
gartner attack surface management magic quadrant: Cloud Computing for Enterprise Architectures Zaigham Mahmood, Richard Hill, 2011-12-01 This important text provides a single point of reference for state-of-the-art cloud computing design and implementation techniques. The book examines cloud computing from the perspective of enterprise architecture, asking the question; how do we realize new business potential with our existing enterprises? Topics and features: with a Foreword by Thomas Erl; contains contributions from an international selection of preeminent experts; presents the state-of-the-art in enterprise architecture approaches with respect to cloud computing models, frameworks, technologies, and applications; discusses potential research directions, and technologies to facilitate the realization of emerging business models through enterprise architecture approaches; provides relevant theoretical frameworks, and the latest empirical research findings. |
gartner attack surface management magic quadrant: Cybersecurity for Industry 4.0 Lane Thames, Dirk Schaefer, 2017-04-03 This book introduces readers to cybersecurity and its impact on the realization of the Industry 4.0 vision. It covers the technological foundations of cybersecurity within the scope of the Industry 4.0 landscape and details the existing cybersecurity threats faced by Industry 4.0, as well as state-of-the-art solutions with regard to both academic research and practical implementations. Industry 4.0 and its associated technologies, such as the Industrial Internet of Things and cloud-based design and manufacturing systems are examined, along with their disruptive innovations. Further, the book analyzes how these phenomena capitalize on the economies of scale provided by the Internet. The book offers a valuable resource for practicing engineers and decision makers in industry, as well as researchers in the design and manufacturing communities and all those interested in Industry 4.0 and cybersecurity. |
gartner attack surface management magic quadrant: Rational Cybersecurity for Business Dan Blum, 2020-06-27 Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your business |
gartner attack surface management magic quadrant: Crossing the Chasm Geoffrey A. Moore, 2009-03-17 Here is the bestselling guide that created a new game plan for marketing in high-tech industries. Crossing the Chasm has become the bible for bringing cutting-edge products to progressively larger markets. This edition provides new insights into the realities of high-tech marketing, with special emphasis on the Internet. It's essential reading for anyone with a stake in the world's most exciting marketplace. |
gartner attack surface management magic quadrant: The Robotic Process Automation Handbook Tom Taulli, 2020-02-28 While Robotic Process Automation (RPA) has been around for about 20 years, it has hit an inflection point because of the convergence of cloud computing, big data and AI. This book shows you how to leverage RPA effectively in your company to automate repetitive and rules-based processes, such as scheduling, inputting/transferring data, cut and paste, filling out forms, and search. Using practical aspects of implementing the technology (based on case studies and industry best practices), you’ll see how companies have been able to realize substantial ROI (Return On Investment) with their implementations, such as by lessening the need for hiring or outsourcing. By understanding the core concepts of RPA, you’ll also see that the technology significantly increases compliance – leading to fewer issues with regulations – and minimizes costly errors. RPA software revenues have recently soared by over 60 percent, which is the fastest ramp in the tech industry, and they are expected to exceed $1 billion by the end of 2019. It is generally seamless with legacy IT environments, making it easier for companies to pursue a strategy of digital transformation and can even be a gateway to AI. The Robotic Process Automation Handbook puts everything you need to know into one place to be a part of this wave. What You'll Learn Develop the right strategy and planDeal with resistance and fears from employeesTake an in-depth look at the leading RPA systems, including where they are most effective, the risks and the costsEvaluate an RPA system Who This Book Is For IT specialists and managers at mid-to-large companies |
gartner attack surface management magic quadrant: Effective Cybersecurity William Stallings, 2018-07-20 The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the “how” of implementation, integrated into a unified framework and realistic plan of action. Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material: clear learning objectives, keyword lists, review questions, and QR codes linking to relevant standards documents and web resources. Effective Cybersecurity aligns with the comprehensive Information Security Forum document “The Standard of Good Practice for Information Security,” extending ISF’s work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature. • Understand the cybersecurity discipline and the role of standards and best practices • Define security governance, assess risks, and manage strategy and tactics • Safeguard information and privacy, and ensure GDPR compliance • Harden systems across the system development life cycle (SDLC) • Protect servers, virtualized systems, and storage • Secure networks and electronic communications, from email to VoIP • Apply the most appropriate methods for user authentication • Mitigate security risks in supply chains and cloud environments This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable. |
gartner attack surface management magic quadrant: Container Security Liz Rice, 2020-04-06 To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions. Author Liz Rice, Chief Open Source Officer at Isovalent, looks at how the building blocks commonly used in container-based systems are constructed in Linux. You'll understand what's happening when you deploy containers and learn how to assess potential security risks that could affect your deployments. If you run container applications with kubectl or docker and use Linux command-line tools such as ps and grep, you're ready to get started. Explore attack vectors that affect container deployments Dive into the Linux constructs that underpin containers Examine measures for hardening containers Understand how misconfigurations can compromise container isolation Learn best practices for building container images Identify container images that have known software vulnerabilities Leverage secure connections between containers Use security tooling to prevent attacks on your deployment |
gartner attack surface management magic quadrant: Business and Consumer Analytics: New Ideas Pablo Moscato, Natalie Jane de Vries, 2019-05-30 This two-volume handbook presents a collection of novel methodologies with applications and illustrative examples in the areas of data-driven computational social sciences. Throughout this handbook, the focus is kept specifically on business and consumer-oriented applications with interesting sections ranging from clustering and network analysis, meta-analytics, memetic algorithms, machine learning, recommender systems methodologies, parallel pattern mining and data mining to specific applications in market segmentation, travel, fashion or entertainment analytics. A must-read for anyone in data-analytics, marketing, behavior modelling and computational social science, interested in the latest applications of new computer science methodologies. The chapters are contributed by leading experts in the associated fields.The chapters cover technical aspects at different levels, some of which are introductory and could be used for teaching. Some chapters aim at building a common understanding of the methodologies and recent application areas including the introduction of new theoretical results in the complexity of core problems. Business and marketing professionals may use the book to familiarize themselves with some important foundations of data science. The work is a good starting point to establish an open dialogue of communication between professionals and researchers from different fields. Together, the two volumes present a number of different new directions in Business and Customer Analytics with an emphasis in personalization of services, the development of new mathematical models and new algorithms, heuristics and metaheuristics applied to the challenging problems in the field. Sections of the book have introductory material to more specific and advanced themes in some of the chapters, allowing the volumes to be used as an advanced textbook. Clustering, Proximity Graphs, Pattern Mining, Frequent Itemset Mining, Feature Engineering, Network and Community Detection, Network-based Recommending Systems and Visualization, are some of the topics in the first volume. Techniques on Memetic Algorithms and their applications to Business Analytics and Data Science are surveyed in the second volume; applications in Team Orienteering, Competitive Facility-location, and Visualization of Products and Consumers are also discussed. The second volume also includes an introduction to Meta-Analytics, and to the application areas of Fashion and Travel Analytics. Overall, the two-volume set helps to describe some fundamentals, acts as a bridge between different disciplines, and presents important results in a rapidly moving field combining powerful optimization techniques allied to new mathematical models critical for personalization of services. Academics and professionals working in the area of business anyalytics, data science, operations research and marketing will find this handbook valuable as a reference. Students studying these fields will find this handbook useful and helpful as a secondary textbook. |
gartner attack surface management magic quadrant: Marketing Management Christie L. Nordhielm, Marta Dapena Baron, 2014-01-07 Marketing Management: The Big Picture organizes traditional Marketing Management theory and practice in a conceptually appealing way. The use of well-known examples and consumer commercials throughout the content ensures students will commit to memory and innovative method for structuring and solving marketing problems. The framework constitutes a disciplined approach to connecting marking variables to each other, inextricably linking marketing strategy concepts with their executional implications. |
gartner attack surface management magic quadrant: Asset Attack Vectors Morey J. Haber, Brad Hibbert, 2018-06-15 Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn’t matter whether an organization uses LAN, WAN, wireless, or even a modern PAN—savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization’s cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You’ll Learn Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls Who This Book Is For New and intermediate security management professionals, auditors, and information technology staff looking to build an effective vulnerability management program and defend against asset based cyberattacks |
gartner attack surface management magic quadrant: Getting Results from Your Analyst Relations Strategies Louis Columbus, 2004-11 Getting Results From Your Analyst Relations Strategies takes the many myths and half-truths surrounding industry analysts and exposes them through real-world examples. Louis Columbus' eighteen years of IT experience and over three years as an industry analyst translates into valuable advice for anyone looking to make the most of their investment in industry analysts. Getting Results From Your Analyst Relations Strategies covers: Best and worst practices in analyst relations. Answers the question: Are Analysts Ethical? Building analyst relationships that deliver sales results. Defining an analyst relations strategy that delivers solid ROI. Why Public Relations and Analyst Relations are widely different. Getting Results From Your Analyst Relations Strategies exposes the many worst practices companies make when trying to get analysts onboard with their vision and plans. |
gartner attack surface management magic quadrant: ASP.NET Core Application Development James Chambers, David Paquette, Simon Timms, 2016-11-29 This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Through four complete sprints, this book takes you through every step needed to build brand new cross-platform web apps with ASP.NET Core, and make them available on the Internet. You won't just master Microsoft's revolutionary open source ASP.NET Core technology: you'll learn how to integrate the immense power of MVC, Docker, Azure Web Apps, Visual Studio and Visual Studio Code, C#, JavaScript, TypeScript, and Entity Framework. Working through the authors' carefully designed sprints, you'll start with a blank canvas, move through software architecture and design, adjusting to user feedback, recovering from mistakes, builds, testing, deployment, maintenance, refactoring, and more. Along the way, you'll learn techniques for delivering state-of-the-art software to users more rapidly and repeatably than ever before. |
gartner attack surface management magic quadrant: Symptom-Based Diagnosis in Pediatrics (CHOP Morning Report) Samir S. Shah, Stephen Ludwig, 2014-01-03 A CASE-BASED GUIDE TO PEDIATRIC DIAGNOSIS, CONVENIENTLY ORGANIZED BY PRESENTING SYMPTOMS Symptom-Based Diagnosis in Pediatrics features 19 chapters, each devoted to a common pediatric complaint. Within each chapter, five to eight case presentations teach the diagnostic approach to the symptom. The case presentations follow a consistent outline of History, Physical Examination, and Course of Illness, and are followed by discussion of the Differential Diagnosis, Diagnosis Incidence and Epidemiology, Clinical Manifestations, Diagnostic Approach, and Treatment. Cases are illustrated with vibrant full-color photographs and include numerous tables comparing potential diagnoses. Organized by symptoms--the way patients actually present More than 100 cases teach the diagnostic approach to a symptom Cases illustrate how the same complaint can have a variety of causes Full-color clinical photos and illustrations sharpen your visual diagnosis skills Valuable tables detail the most frequent causes of common symptoms CASE-BASED COVERAGE OF THE SYMPTOMS YOU'RE MOST LIKELY TO ENCOUNTER IN PEDIATRIC PRACTICE Wheezing * Decreased Activity Level * Vomiting * Coughing * Back, Joint, and Extremity Pain * Poor Weight Gain * Abdominal Pain * Altered Mental Status * Rash * Pallor * Fever * Constipation * Neck Swelling * Chest Pain * Jaundice * Abnormal Gait * Diarrhea * Syncope * Seizures Editors Samir S. Shah, MD, MSCE is Director, Division of Hospital Medicine, James M. Ewell Endowed Chair, and Attending Physician in Hospital Medicine & Infectious Diseases at Cincinnati Children’s Hospital Medical Center; and Professor in the Department of Pediatrics at the University of Cincinnati College of Medicine. Stephen Ludwig, MD is Chairman of the Graduate Medical Education Committee and Continuing Medical Education Committee and an attending physician in general pediatrics at The Children's Hospital of Philadelphia; and Emeritus Professor of Pediatrics at the Perelman School of Medicine at the University of Pennsylvania. |
gartner attack surface management magic quadrant: Balanced Scorecard Step-by-Step Paul R. Niven, 2002-10-15 This book explains how an organization can measure and manage performance with the Balanced Scorecard methodology. It provides extensive background on performance management and the Balanced Scorecard, and focuses on guiding a team through the step-by-step development and ongoing implementation of a Balanced Scorecard system. Corporations, public sector agencies, and not for profit organizations have all reaped success from the Balanced Scorecard. This book supplies detailed implementation advice that is readily applied to any and all of these organization types. Additionally, it will benefit organizations at any stage of Balanced Scorecard development. Regardless of whether you are just contemplating a Balanced Scorecard, require assistance in linking their current Scorecard to management processes, or need a review of their past measurement efforts, Balanced Scorecard Step by Step provides detailed advice and proven solutions. |
gartner attack surface management magic quadrant: Mastering Microsoft Azure Infrastructure Services John Savill, 2015-04-01 Understand, create, deploy, and maintain a public cloud using Microsoft Azure Mastering Microsoft Azure Infrastructure Services guides you through the process of creating and managing a public cloud and virtual network using Microsoft Azure. With step-by-step instruction and clear explanation, this book equips you with the skills required to provide services both on-premises and off-premises through full virtualization, providing a deeper understanding of Azure's capabilities as an infrastructure service. Each chapter includes online videos that visualize and enhance the concepts presented in the book, and access to a Windows app that provides instant Azure updates and demonstrates the process of going from on-premises to public cloud via Azure. Coverage includes storage customization, connectivity, virtual networks, backing up, hybrid environments, System Center management, and more, giving you everything you need to understand, evaluate, deploy, and maintain environments that utilize Microsoft Azure. Understand cost, options, and applications of Infrastructure as a Service (IaaS) Enable on- and off-premises connectivity to Azure Customize Azure templates and management processes Exploit key technologies and embrace the hybrid environment Mastering Microsoft Azure Infrastructure Services is your total solution. |
gartner attack surface management magic quadrant: Cyber-Physical Threat Intelligence for Critical Infrastructures Security John Soldatos, James Philpot, Gabriele Giunta, 2020-06-30 Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies. |
gartner attack surface management magic quadrant: Maintenance Excellence John D. Campbell, Andrew K.S. Jardine, 2001-02-13 Considering maintenance from a proactive, rather than reactive, perspective, Maintenance Excellence details the strategies, tools, and solutions for maximizing the productivity of physical assets—focusing on profitability potential. The editors address contemporary concerns, key terms, data requirements, critical methodologies, and essential mathematical needs. They present maintenance in a business context, review planning, measurement, feedback, and techniques related to cost, efficiency, and results, and summarize applications of tools and software from statistics and neural networks to cost-optimized models. |
gartner attack surface management magic quadrant: Cyber Safe Renee Tarun, Susan Burg, 2021-03-12 Everybody says be careful online, but what do they mean? Lacey is a cyber-smart dog who protects kids by teaching them how to stay safe online. Join Lacey and her friend Gabbi on a fun, cyber safe adventure and learn the ins and outs of how to behave and how to keep yourself safe online. In this day in age our kids are accessing the internet about as soon as they can read! Cyber Safe is a fun way to ensure they understand their surroundings in our digital world. |
gartner attack surface management magic quadrant: The Design Warrior's Guide to FPGAs Clive Maxfield, 2004-06-16 Field Programmable Gate Arrays (FPGAs) are devices that provide a fast, low-cost way for embedded system designers to customize products and deliver new versions with upgraded features, because they can handle very complicated functions, and be reconfigured an infinite number of times. In addition to introducing the various architectural features available in the latest generation of FPGAs, The Design Warrior's Guide to FPGAs also covers different design tools and flows.This book covers information ranging from schematic-driven entry, through traditional HDL/RTL-based simulation and logic synthesis, all the way up to the current state-of-the-art in pure C/C++ design capture and synthesis technology. Also discussed are specialist areas such as mixed hardward/software and DSP-based design flows, along with innovative new devices such as field programmable node arrays (FPNAs). Clive Max Maxfield is a bestselling author and engineer with a large following in the electronic design automation (EDA)and embedded systems industry. In this comprehensive book, he covers all the issues of interest to designers working with, or contemplating a move to, FPGAs in their product designs. While other books cover fragments of FPGA technology or applications this is the first to focus exclusively and comprehensively on FPGA use for embedded systems. - First book to focus exclusively and comprehensively on FPGA use in embedded designs - World-renowned best-selling author - Will help engineers get familiar and succeed with this new technology by providing much-needed advice on choosing the right FPGA for any design project |
gartner attack surface management magic quadrant: Serious Educational Game Assessment: Practical Methods and Models for Educational Games, Simulations and Virtual Worlds L.A. Annetta, Stephen Bronack, 2011-07-22 In an increasingly scientific and technological world the need for a knowledgeable citizenry, individuals who understand the fundamentals of technological ideas and think critically about these issues, has never been greater. There is growing appreciation across the broader education community that educational three dimensional virtual learning environments are part of the daily lives of citizens, not only regularly occurring in schools and in after-school programs, but also in informal settings like museums, science centers, zoos and aquariums, at home with family, in the workplace, during leisure time when children and adults participate in community-based activities. This blurring of the boundaries of where, when, why, how and with whom people learn, along with better understandings of learning as a personally constructed, life-long process of making meaning and shaping identity, has initiated a growing awareness in the field that the questions and frameworks guiding assessing these environments should be reconsidered in light of these new realities. The audience for this book will be researchers working in the Serious Games arena along with distance education instructors and administrators and students on the cutting edge of assessment in computer generated environments. |
gartner attack surface management magic quadrant: Customer Relationship Management Francis Buttle, 2009 This title presents an holistic view of CRM, arguing that its essence concerns basic business strategy - developing and maintaining long-term, mutually beneficial relationships with strategically significant customers - rather than the operational tools which achieve these aims. |
gartner attack surface management magic quadrant: SAP HANA 2.0 Denys Van Kempen, 2019 Enter the fast-paced world of SAP HANA 2.0 with this introductory guide. Begin with an exploration of the technological backbone of SAP HANA as a database and platform. Then, step into key SAP HANA user roles and discover core capabilities for administration, application development, advanced analytics, security, data integration, and more. No matter how SAP HANA 2.0 fits into your business, this book is your starting point. In this book, you'll learn about: a. Technology Discover what makes an in-memory database platform. Learn about SAP HANA's journey from version 1.0 to 2.0, take a tour of your technology options, and walk through deployment scenarios and implementation requirements. b. Tools Unpack your SAP HANA toolkit. See essential tools in action, from SAP HANA cockpit and SAP HANA studio, to the SAP HANA Predictive Analytics Library and SAP HANA smart data integration. c. Key Roles Understand how to use SAP HANA as a developer, administrator, data scientist, data center architect, and more. Explore key tasks like backend programming with SQLScript, security setup with roles and authorizations, data integration with the SAP HANA Data Management Suite, and more. Highlights include: 1) Architecture 2) Administration 3) Application development 4) Analytics 5) Security 6) Data integration 7) Data architecture 8) Data center |
gartner attack surface management magic quadrant: Pro Azure Governance and Security Peter De Tender, David Rendon, Samuel Erskine, 2019-06-19 Any IT professional can tell you that managing security is a top priority and even more so when working in the cloud. Access to accurate and timely security information is critical, but governance and control must first be enabled. This guide shows you how to take advantage of Azure's vast and powerful built-in security tools and capabilities for your application workloads. Pro Azure Governance and Security offers a comprehensive look at the governance features available with Microsoft Azure and demonstrates how to integrate them with your hybrid and Azure environments, drawing on the author's experiences from years in the field. Learn about the array of controls implemented within Microsoft Azure from two valuable perspectives: the customer and Microsoft operations. Beginning with the top-level subscription hierarchy, learn about the most important built-in Azure security services and features, as well as how to use Azure Policies and Blueprints as a means for security and governance. A series of hands-on exercises teaches you the concepts of Azure Governance: how to enable and deploy Azure Security Center, integrate RBAC (role-based access control), and set up Azure Operations and Monitoring. Get introduced to the new Azure Sentinel solution that offers SIEM as a service for security incident management and proactive hunting. What You'll Learn Understand different architectural designs for implementing Azure Security Operate and monitor an Azure environmentDeploy Azure Governance, Policies, and BlueprintsDiscover key Azure features that enhance securityImplement and confidently access Azure Security CenterGet to know Azure Sentinel Who This Book Is For Technical engineers, consultants, solution and cloud architects, IT managers, and SecOps teams who need to understand how to integrate governance, security, and compliance in hybrid and Azure environments. A basic understanding of Azure or other public cloud platforms is beneficial, but not required. |
gartner attack surface management magic quadrant: Enterprise Interoperability III Kai Mertins, Rainer Ruggaber, Keith Popplewell, Xiaofei Xu, 2008-03-25 Interoperability: the ability of a system or a product to work with other systems or products without special effort from the user is a key issue in manufacturing and industrial enterprise generally. It is fundamental to the production of goods and services quickly and at low cost at the same time as maintaining levels of quality and customisation. Composed of over 50 papers, Enterprise Interoperability III ranges from academic research through case studies to industrial and administrative experience of interoperability. The international nature of the authorship continues to broaden. Many of the papers have examples and illustrations calculated to deepen understanding and generate new ideas. A concise reference to the state of the art in software interoperability, Enterprise Interoperability III will be of great value to engineers and computer scientists working in manufacturing and other process industries and to software engineers and electronic and manufacturing engineers working in the academic environment. |
gartner attack surface management magic quadrant: Leadership for the Common Good Barbara C. Crosby, John M. Bryson, 2005-02-18 When it was first published in 1992, the first edition of Leadership for the Common Good presented a revolutionary approach to community and organizational leadership in a shared-power world. Now, in this completely revised and updated edition, Barbara Crosby and John Bryson expand on their proven leadership model and offer new insights and guidance to leaders. This second edition is a practical resource for a new generation of leaders and aspiring leaders and includes success stories, challenges, and real-world experience. |
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业 …
Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔 …
如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。
普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …
IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商 …
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响应) …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原 …
EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据 …
如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的 …
什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT …
Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最 …
如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。
普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭 …
IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术 …