Securing systems applied security architecture and threat models

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This...

Full description

Saved in:
Bibliographic Details
Main Author: Schoenfield, Brook S. E. (Author)
Format: Book
Language:English
Published: Boca Raton, FL CRC Press [2015]
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Chapter 1: Introduction
  • Chapter 2: The Art of Security Assessment
  • Chapter 3: Security Architecture of Systems
  • Chapter 4: Information Security Risk
  • Chapter 5: Prepare for Assessment
  • Chapter 6: eCommerce Website
  • Chapter 7: Enterprise Architecture
  • Chapter 8: Business Analytics
  • Chapter 9: Endpoint Anti-malware
  • Chapter 10: Mobile Security Software with Cloud Management
  • Chapter 11: Cloud Software as a Service (SaaS)
  • Chapter 12: Patterns and Governance Deliver Economies of Scale
  • Chapter 13: Building an Assessment Program