|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1033575048 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
180428s2018 nyu o 001 0 eng |
010 |
|
|
|a 2018020821
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d OCLCO
|d OCLCF
|d UMI
|d OCLCQ
|d TOH
|d C6I
|d UKAHL
|d VT2
|d YDX
|d EBLCP
|d HS0
|d N$T
|d YDX
|d JTB
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1048631174
|a 1100669589
|a 1129377273
|a 1164498545
|a 1165391856
|
020 |
|
|
|a 9781260118186
|q electronic book
|
020 |
|
|
|a 1260118185
|q electronic book
|
020 |
|
|
|z 9781260118179
|q paperback
|
020 |
|
|
|z 1260118177
|q paperback
|
029 |
1 |
|
|a AU@
|b 000066231314
|
029 |
1 |
|
|a AU@
|b 000068970498
|
035 |
|
|
|a (OCoLC)1033575048
|z (OCoLC)1048631174
|z (OCoLC)1100669589
|z (OCoLC)1129377273
|z (OCoLC)1164498545
|z (OCoLC)1165391856
|
037 |
|
|
|a CL0500000986
|b Safari Books Online
|
042 |
|
|
|a pcc
|
050 |
1 |
0 |
|a TK5105.59
|b .S29 2018
|
080 |
|
|
|a 004.72
|
082 |
0 |
0 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Saydjari, O. Sami,
|e author.
|
245 |
1 |
0 |
|a Engineering trustworthy systems :
|b get cybersecurity design right the first time /
|c O. Sami Saydjari.
|
264 |
|
1 |
|a New York, NY :
|b McGraw-Hill Education,
|c [2018]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices--
|c Provided by publisher.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I What Do You Want? -- Chapter 1 What's the Problem? -- Overview -- Learning Objectives -- 1.1 Baking in Trustworthiness: Design-Time -- 1.1.1 What Is Trust? -- 1.1.2 Trust and Belief -- 1.1.3 Engineering -- 1.1.4 Why Trust? -- 1.2 Operational Perspective: Basic Questions -- 1.2.1 Am I Under Attack? -- 1.2.2 What Is the Nature of the Attack? -- 1.2.3 What Is the Mission Impact So Far? -- 1.2.4 What Is the Potential Mission Impact? -- 1.2.5 When Did It Start?
|
505 |
8 |
|
|a 1.2.6 Who Is Attacking? -- 1.2.7 What Are They Trying to Do? -- 1.2.8 What Is the Attacker's Next Step? -- 1.2.9 What Can I Do About It? -- 1.2.10 What Are My Options and How Effective Will Each Option Be? -- 1.2.11 How Will My Mitigation Actions Affect Operation? -- 1.2.12 How Do I Better Defend Myself in the Future? -- 1.3 Asymmetry of Cyberspace Effects -- 1.3.1 Dimensionality -- 1.3.2 Nonlinearity -- 1.3.3 Coupling -- 1.3.4 Velocity -- 1.3.5 Manifestation -- 1.3.6 Detectability -- 1.4 The Cybersecurity Solution Landscape -- 1.4.1 Information Assurance Science and Engineering
|
505 |
8 |
|
|a 1.4.2 Defensive Mechanisms -- 1.4.3 Cybersensors and Exploitation -- 1.4.4 Cyber Situation Understanding -- 1.4.5 Cyber Actuation -- 1.4.6 Cyber Command and Control -- 1.4.7 Cyber Defense Strategy and Tactics -- 1.5 Ounces of Prevention and Pounds of Cure -- Conclusion -- Questions -- Chapter 2 Cybersecurity Right-Think -- Overview -- Learning Objectives -- 2.1 It's About Risk -- 2.2 The Cybersecurity Trade-off: Performance and Functionality -- 2.2.1 User-Friendliness -- 2.2.2 Time to Market -- 2.2.3 Employee Morale -- 2.2.4 Missed Opportunity -- 2.2.5 Opportunity Cost
|
505 |
8 |
|
|a 2.2.6 Quantity of Service or Product -- 2.2.7 Quality of Service or Product -- 2.2.8 Cost of Service or Product -- 2.2.9 Limited Resources -- 2.3 Theories of Security Come from Theories of Insecurity -- 2.4 They Come at You Through the Weeds -- 2.5 Top-Down Meets Bottom-Up -- 2.6 Cybersecurity Is a Live Orchestra, Not a Recorded Instrument -- Conclusion -- Questions -- Chapter 3 Value and Mission: Know Thyself -- Overview -- Learning Objectives -- 3.1 Focus on Mission and Value -- 3.1.1 Avoid Concentrating Value -- 3.1.2 Beware the Complacency of Trust
|
505 |
8 |
|
|a 3.2 Confidentiality: Value of Secrecy from Adversaries -- 3.2.1 Acquired-Knowledge Secrets -- 3.2.2 Planning Secrets -- 3.2.3 Stolen Secrets -- 3.2.4 Means-of-Stealing-Secrets Secrets -- 3.3 Confidentiality: Beware the Tyranny of Secrecy -- 3.3.1 Secrecy Is Tenuous -- 3.3.2 Secrecy Is Expensive -- 3.3.3 Secrecy Can Be Self-Defeating -- 3.3.4 Secrecy Is Self-Breeding -- 3.3.5 Secrecy Creates a Form of Corrupting Power and Impediment to Operation -- 3.4 Confidentiality: Changing the Value Proposition -- 3.4.1 Minimize Secrecy and Dependency on Secrecy -- 3.4.2 Minimize Impact of Loss of Secrecy
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on March 30, 2021).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
776 |
0 |
8 |
|i Print version:
|a Saydjari, O. Sami.
|t Engineering trustworthy systems.
|d New York : McGraw-Hill Education, [2018]
|z 9781260118179
|w (DLC) 2018019355
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781260118186/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH34391982
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16842518
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6258329
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2687677
|
994 |
|
|
|a 92
|b IZTAP
|