Securing systems : applied security architecture and threat models /
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Schoenfield, Brook S. E. (Autor) |
Otros Autores: | Stewart, John N. (writer of foreword.), Ransome, James F. (writer of foreword.) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton :
CRC Press,
[2015]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Multicast and group security /
por: Hardjono, Thomas
Publicado: (2003) -
Network security architectures /
por: Convery, Sean
Publicado: (2004) -
Router security strategies : securing IP network traffic planes /
por: Schudel, Gregg
Publicado: (2008) -
Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
por: Mukherjee, Aditya
Publicado: (2020) -
Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
por: Mukherjee, Aditya
Publicado: (2020)