|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn910662968 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
150604t20152015flu ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d IDEBK
|d N$T
|d E7B
|d EBLCP
|d YDXCP
|d DEBSZ
|d UMI
|d B24X7
|d CDX
|d COO
|d VLB
|d DEBBG
|d CRCPR
|d OCLCF
|d Z5A
|d VGM
|d LIV
|d OCLCQ
|d MERUC
|d UAB
|d OCLCQ
|d VT2
|d STF
|d I9W
|d OCLCQ
|d BUF
|d OCLCQ
|d CEF
|d OCLCQ
|d U3W
|d OCLCQ
|d WYU
|d YDX
|d TYFRS
|d LEAUB
|d OCLCQ
|d UKAHL
|d OCLCQ
|d UKMGB
|d OCLCQ
|d BRF
|d AU@
|d SFB
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBB575450
|2 bnb
|
016 |
7 |
|
|a 017391659
|2 Uk
|
019 |
|
|
|a 913696401
|a 914301409
|a 1008946258
|a 1049572409
|a 1058569166
|a 1066493452
|a 1096216929
|a 1156362617
|a 1192328381
|a 1240534335
|a 1260360499
|a 1330994033
|a 1390934415
|a 1391467449
|
020 |
|
|
|a 9781482233988
|q (electronic bk.)
|
020 |
|
|
|a 1482233983
|q (electronic bk.)
|
020 |
|
|
|a 9780429069260
|q (electronic bk.)
|
020 |
|
|
|a 042906926X
|q (electronic bk.)
|
020 |
|
|
|z 9781482233971
|
020 |
|
|
|z 1482233975
|
024 |
8 |
|
|a 99965986748
|
029 |
1 |
|
|a AU@
|b 000054976054
|
029 |
1 |
|
|a AU@
|b 000062584971
|
029 |
1 |
|
|a AU@
|b 000065155555
|
029 |
1 |
|
|a AU@
|b 000067075396
|
029 |
1 |
|
|a DEBBG
|b BV042991489
|
029 |
1 |
|
|a DEBBG
|b BV043019975
|
029 |
1 |
|
|a DEBBG
|b BV043620559
|
029 |
1 |
|
|a DEBSZ
|b 442839243
|
029 |
1 |
|
|a DEBSZ
|b 453330029
|
029 |
1 |
|
|a DEBSZ
|b 455695431
|
029 |
1 |
|
|a GBVCP
|b 829793380
|
029 |
1 |
|
|a GBVCP
|b 882846213
|
029 |
1 |
|
|a UKMGB
|b 017391659
|
035 |
|
|
|a (OCoLC)910662968
|z (OCoLC)913696401
|z (OCoLC)914301409
|z (OCoLC)1008946258
|z (OCoLC)1049572409
|z (OCoLC)1058569166
|z (OCoLC)1066493452
|z (OCoLC)1096216929
|z (OCoLC)1156362617
|z (OCoLC)1192328381
|z (OCoLC)1240534335
|z (OCoLC)1260360499
|z (OCoLC)1330994033
|z (OCoLC)1390934415
|z (OCoLC)1391467449
|
037 |
|
|
|a CL0500000622
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .S36 2015eb
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Schoenfield, Brook S. E.,
|e author.
|
245 |
1 |
0 |
|a Securing systems :
|b applied security architecture and threat models /
|c Brook S.E. Schoenfield ; forewords by John N. Stewart and James F. Ransome.
|
264 |
|
1 |
|a Boca Raton :
|b CRC Press,
|c [2015]
|
264 |
|
4 |
|c ©20
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed June 11, 2015).
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover; Dedication; Contents; Foreword; Foreword; Preface; Acknowledgments; About the Author; Part I; Part I: Introduction; Chapter 1: Introduction; Chapter 2: The Art of Security Assessment; Chapter 3: Security Architecture of Systems; Chapter 4: Information Security Risk; Chapter 5: Prepare for Assessment; Part I: Summary; Part II; Part II: Introduction; Chapter 6: eCommerce Website; Chapter 7: Enterprise Architecture; Chapter 8: Business Analytics; Chapter 9: Endpoint Anti-malware; Chapter 10: Mobile Security Software with Cloud Management; Chapter 11: Cloud Software as a Service (SaaS).
|
505 |
8 |
|
|a Part II: SummaryPart III; Part III: Introduction; Chapter 12: Patterns and Governance Deliver Economies of Scale; Chapter 13: Building an Assessment Program; Part III: Summary and Afterword; Back Cover.
|
520 |
|
|
|a Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing System.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
700 |
1 |
|
|a Stewart, John N.,
|e writer of foreword.
|
700 |
1 |
|
|a Ransome, James F.,
|e writer of foreword.
|
776 |
0 |
8 |
|i Print version:
|a Schoenfield, Brook S.E.
|t Securing Systems : Applied Security Architecture and Threat Models.
|d Hoboken : CRC Press, ©2015
|z 9781482233971
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781482233988/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH28237115
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00074138
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 31466496
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL2050819
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr11057050
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 992438
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis31466496
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780429069260
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n CRC0KE25905PDF
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15915282
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12382986
|
994 |
|
|
|a 92
|b IZTAP
|