Cargando…

Securing systems : applied security architecture and threat models /

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Schoenfield, Brook S. E. (Autor)
Otros Autores: Stewart, John N. (writer of foreword.), Ransome, James F. (writer of foreword.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : CRC Press, [2015]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn910662968
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 150604t20152015flu ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d IDEBK  |d N$T  |d E7B  |d EBLCP  |d YDXCP  |d DEBSZ  |d UMI  |d B24X7  |d CDX  |d COO  |d VLB  |d DEBBG  |d CRCPR  |d OCLCF  |d Z5A  |d VGM  |d LIV  |d OCLCQ  |d MERUC  |d UAB  |d OCLCQ  |d VT2  |d STF  |d I9W  |d OCLCQ  |d BUF  |d OCLCQ  |d CEF  |d OCLCQ  |d U3W  |d OCLCQ  |d WYU  |d YDX  |d TYFRS  |d LEAUB  |d OCLCQ  |d UKAHL  |d OCLCQ  |d UKMGB  |d OCLCQ  |d BRF  |d AU@  |d SFB  |d OCLCO  |d OCLCQ 
015 |a GBB575450  |2 bnb 
016 7 |a 017391659  |2 Uk 
019 |a 913696401  |a 914301409  |a 1008946258  |a 1049572409  |a 1058569166  |a 1066493452  |a 1096216929  |a 1156362617  |a 1192328381  |a 1240534335  |a 1260360499  |a 1330994033  |a 1390934415  |a 1391467449 
020 |a 9781482233988  |q (electronic bk.) 
020 |a 1482233983  |q (electronic bk.) 
020 |a 9780429069260  |q (electronic bk.) 
020 |a 042906926X  |q (electronic bk.) 
020 |z 9781482233971 
020 |z 1482233975 
024 8 |a 99965986748 
029 1 |a AU@  |b 000054976054 
029 1 |a AU@  |b 000062584971 
029 1 |a AU@  |b 000065155555 
029 1 |a AU@  |b 000067075396 
029 1 |a DEBBG  |b BV042991489 
029 1 |a DEBBG  |b BV043019975 
029 1 |a DEBBG  |b BV043620559 
029 1 |a DEBSZ  |b 442839243 
029 1 |a DEBSZ  |b 453330029 
029 1 |a DEBSZ  |b 455695431 
029 1 |a GBVCP  |b 829793380 
029 1 |a GBVCP  |b 882846213 
029 1 |a UKMGB  |b 017391659 
035 |a (OCoLC)910662968  |z (OCoLC)913696401  |z (OCoLC)914301409  |z (OCoLC)1008946258  |z (OCoLC)1049572409  |z (OCoLC)1058569166  |z (OCoLC)1066493452  |z (OCoLC)1096216929  |z (OCoLC)1156362617  |z (OCoLC)1192328381  |z (OCoLC)1240534335  |z (OCoLC)1260360499  |z (OCoLC)1330994033  |z (OCoLC)1390934415  |z (OCoLC)1391467449 
037 |a CL0500000622  |b Safari Books Online 
050 4 |a TK5105.59  |b .S36 2015eb 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Schoenfield, Brook S. E.,  |e author. 
245 1 0 |a Securing systems :  |b applied security architecture and threat models /  |c Brook S.E. Schoenfield ; forewords by John N. Stewart and James F. Ransome. 
264 1 |a Boca Raton :  |b CRC Press,  |c [2015] 
264 4 |c ©20 
264 4 |c ©2015 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed June 11, 2015). 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; Dedication; Contents; Foreword; Foreword; Preface; Acknowledgments; About the Author; Part I; Part I: Introduction; Chapter 1: Introduction; Chapter 2: The Art of Security Assessment; Chapter 3: Security Architecture of Systems; Chapter 4: Information Security Risk; Chapter 5: Prepare for Assessment; Part I: Summary; Part II; Part II: Introduction; Chapter 6: eCommerce Website; Chapter 7: Enterprise Architecture; Chapter 8: Business Analytics; Chapter 9: Endpoint Anti-malware; Chapter 10: Mobile Security Software with Cloud Management; Chapter 11: Cloud Software as a Service (SaaS). 
505 8 |a Part II: SummaryPart III; Part III: Introduction; Chapter 12: Patterns and Governance Deliver Economies of Scale; Chapter 13: Building an Assessment Program; Part III: Summary and Afterword; Back Cover. 
520 |a Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing System. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Stewart, John N.,  |e writer of foreword. 
700 1 |a Ransome, James F.,  |e writer of foreword. 
776 0 8 |i Print version:  |a Schoenfield, Brook S.E.  |t Securing Systems : Applied Security Architecture and Threat Models.  |d Hoboken : CRC Press, ©2015  |z 9781482233971 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781482233988/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH28237115 
938 |a Books 24x7  |b B247  |n bks00074138 
938 |a Coutts Information Services  |b COUT  |n 31466496 
938 |a EBL - Ebook Library  |b EBLB  |n EBL2050819 
938 |a ebrary  |b EBRY  |n ebr11057050 
938 |a EBSCOhost  |b EBSC  |n 992438 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis31466496 
938 |a Taylor & Francis  |b TAFR  |n 9780429069260 
938 |a Taylor & Francis  |b TAFR  |n CRC0KE25905PDF 
938 |a YBP Library Services  |b YANK  |n 15915282 
938 |a YBP Library Services  |b YANK  |n 12382986 
994 |a 92  |b IZTAP