Securing systems applied security architecture and threat models
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, FL
CRC Press
[2015]
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 98364 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220022528.0 | ||
| 008 | 221104 20152015flua b 000 0 eng d | ||
| 020 | |a 9781482233971 | ||
| 039 | 9 | |a 202211041134 |b VLOAD |c 201605031639 |d faezah |y 201512091855 |z zubir | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a TK 5105.59 |b .S36 2015 | ||
| 100 | 1 | |a Schoenfield, Brook S. E. |e author | |
| 245 | 1 | 0 | |a Securing systems |b applied security architecture and threat models |c Brook S.E. Schoenfield |
| 246 | 3 | 0 | |a Applied security architecture and threat models |
| 264 | 1 | |a Boca Raton, FL |b CRC Press |c [2015] | |
| 264 | 4 | |c ©2015 | |
| 300 | |a xxvii, 412 pages |b illustrations |c 26 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 504 | |a Includes bibliographical references | ||
| 505 | 0 | |a Chapter 1: Introduction -- Chapter 2: The Art of Security Assessment -- Chapter 3: Security Architecture of Systems -- Chapter 4: Information Security Risk -- Chapter 5: Prepare for Assessment -- Chapter 6: eCommerce Website -- Chapter 7: Enterprise Architecture -- Chapter 8: Business Analytics -- Chapter 9: Endpoint Anti-malware -- Chapter 10: Mobile Security Software with Cloud Management -- Chapter 11: Cloud Software as a Service (SaaS) -- Chapter 12: Patterns and Governance Deliver Economies of Scale -- Chapter 13: Building an Assessment Program | |
| 520 | |a Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.Securing System | ||
| 592 | |a IN/11523 |b 04/03/2016 |c RM 281.23 |h Innowawasan | ||
| 650 | 0 | |a Computer networks |x Security measures | |
| 650 | 0 | |a Computer security | |
| 650 | 0 | |a Security systems | |
| 999 | |a vtls000056035 |c 98364 |d 98364 | ||


