Securing systems : applied security architecture and threat models /
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton :
CRC Press,
[2015]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover; Dedication; Contents; Foreword; Foreword; Preface; Acknowledgments; About the Author; Part I; Part I: Introduction; Chapter 1: Introduction; Chapter 2: The Art of Security Assessment; Chapter 3: Security Architecture of Systems; Chapter 4: Information Security Risk; Chapter 5: Prepare for Assessment; Part I: Summary; Part II; Part II: Introduction; Chapter 6: eCommerce Website; Chapter 7: Enterprise Architecture; Chapter 8: Business Analytics; Chapter 9: Endpoint Anti-malware; Chapter 10: Mobile Security Software with Cloud Management; Chapter 11: Cloud Software as a Service (SaaS).
- Part II: SummaryPart III; Part III: Introduction; Chapter 12: Patterns and Governance Deliver Economies of Scale; Chapter 13: Building an Assessment Program; Part III: Summary and Afterword; Back Cover.