Securing systems applied security architecture and threat models

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This...

Full description

Saved in:
Bibliographic Details
Main Author: Schoenfield, Brook S. E. (Author)
Format: Book
Language:English
Published: Boca Raton, FL CRC Press [2015]
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 i 4500
001 98364
003 MY-KLNDU
005 20241220022528.0
008 221104 20152015flua b 000 0 eng d
020 |a 9781482233971 
039 9 |a 202211041134  |b VLOAD  |c 201605031639  |d faezah  |y 201512091855  |z zubir 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a TK 5105.59  |b .S36 2015 
100 1 |a Schoenfield, Brook S. E.  |e author 
245 1 0 |a Securing systems  |b applied security architecture and threat models  |c Brook S.E. Schoenfield 
246 3 0 |a Applied security architecture and threat models 
264 1 |a Boca Raton, FL  |b CRC Press  |c [2015] 
264 4 |c ©2015 
300 |a xxvii, 412 pages  |b illustrations  |c 26 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
504 |a Includes bibliographical references 
505 0 |a Chapter 1: Introduction -- Chapter 2: The Art of Security Assessment -- Chapter 3: Security Architecture of Systems -- Chapter 4: Information Security Risk -- Chapter 5: Prepare for Assessment -- Chapter 6: eCommerce Website -- Chapter 7: Enterprise Architecture -- Chapter 8: Business Analytics -- Chapter 9: Endpoint Anti-malware -- Chapter 10: Mobile Security Software with Cloud Management -- Chapter 11: Cloud Software as a Service (SaaS) -- Chapter 12: Patterns and Governance Deliver Economies of Scale -- Chapter 13: Building an Assessment Program 
520 |a Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.Securing System 
592 |a IN/11523  |b 04/03/2016  |c RM 281.23  |h Innowawasan 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer security 
650 0 |a Security systems 
999 |a vtls000056035  |c 98364  |d 98364