Cargando…

Engineering trustworthy systems : get cybersecurity design right the first time /

This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to thin...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Saydjari, O. Sami (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : McGraw-Hill Education, [2018]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1033575048
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 180428s2018 nyu o 001 0 eng
010 |a  2018020821 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d OCLCO  |d OCLCF  |d UMI  |d OCLCQ  |d TOH  |d C6I  |d UKAHL  |d VT2  |d YDX  |d EBLCP  |d HS0  |d N$T  |d YDX  |d JTB  |d OCLCO  |d OCLCQ 
019 |a 1048631174  |a 1100669589  |a 1129377273  |a 1164498545  |a 1165391856 
020 |a 9781260118186  |q electronic book 
020 |a 1260118185  |q electronic book 
020 |z 9781260118179  |q paperback 
020 |z 1260118177  |q paperback 
029 1 |a AU@  |b 000066231314 
029 1 |a AU@  |b 000068970498 
035 |a (OCoLC)1033575048  |z (OCoLC)1048631174  |z (OCoLC)1100669589  |z (OCoLC)1129377273  |z (OCoLC)1164498545  |z (OCoLC)1165391856 
037 |a CL0500000986  |b Safari Books Online 
042 |a pcc 
050 1 0 |a TK5105.59  |b .S29 2018 
080 |a 004.72 
082 0 0 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Saydjari, O. Sami,  |e author. 
245 1 0 |a Engineering trustworthy systems :  |b get cybersecurity design right the first time /  |c O. Sami Saydjari. 
264 1 |a New York, NY :  |b McGraw-Hill Education,  |c [2018] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
520 |a This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices--  |c Provided by publisher. 
505 0 |a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I What Do You Want? -- Chapter 1 What's the Problem? -- Overview -- Learning Objectives -- 1.1 Baking in Trustworthiness: Design-Time -- 1.1.1 What Is Trust? -- 1.1.2 Trust and Belief -- 1.1.3 Engineering -- 1.1.4 Why Trust? -- 1.2 Operational Perspective: Basic Questions -- 1.2.1 Am I Under Attack? -- 1.2.2 What Is the Nature of the Attack? -- 1.2.3 What Is the Mission Impact So Far? -- 1.2.4 What Is the Potential Mission Impact? -- 1.2.5 When Did It Start? 
505 8 |a 1.2.6 Who Is Attacking? -- 1.2.7 What Are They Trying to Do? -- 1.2.8 What Is the Attacker's Next Step? -- 1.2.9 What Can I Do About It? -- 1.2.10 What Are My Options and How Effective Will Each Option Be? -- 1.2.11 How Will My Mitigation Actions Affect Operation? -- 1.2.12 How Do I Better Defend Myself in the Future? -- 1.3 Asymmetry of Cyberspace Effects -- 1.3.1 Dimensionality -- 1.3.2 Nonlinearity -- 1.3.3 Coupling -- 1.3.4 Velocity -- 1.3.5 Manifestation -- 1.3.6 Detectability -- 1.4 The Cybersecurity Solution Landscape -- 1.4.1 Information Assurance Science and Engineering 
505 8 |a 1.4.2 Defensive Mechanisms -- 1.4.3 Cybersensors and Exploitation -- 1.4.4 Cyber Situation Understanding -- 1.4.5 Cyber Actuation -- 1.4.6 Cyber Command and Control -- 1.4.7 Cyber Defense Strategy and Tactics -- 1.5 Ounces of Prevention and Pounds of Cure -- Conclusion -- Questions -- Chapter 2 Cybersecurity Right-Think -- Overview -- Learning Objectives -- 2.1 It's About Risk -- 2.2 The Cybersecurity Trade-off: Performance and Functionality -- 2.2.1 User-Friendliness -- 2.2.2 Time to Market -- 2.2.3 Employee Morale -- 2.2.4 Missed Opportunity -- 2.2.5 Opportunity Cost 
505 8 |a 2.2.6 Quantity of Service or Product -- 2.2.7 Quality of Service or Product -- 2.2.8 Cost of Service or Product -- 2.2.9 Limited Resources -- 2.3 Theories of Security Come from Theories of Insecurity -- 2.4 They Come at You Through the Weeds -- 2.5 Top-Down Meets Bottom-Up -- 2.6 Cybersecurity Is a Live Orchestra, Not a Recorded Instrument -- Conclusion -- Questions -- Chapter 3 Value and Mission: Know Thyself -- Overview -- Learning Objectives -- 3.1 Focus on Mission and Value -- 3.1.1 Avoid Concentrating Value -- 3.1.2 Beware the Complacency of Trust 
505 8 |a 3.2 Confidentiality: Value of Secrecy from Adversaries -- 3.2.1 Acquired-Knowledge Secrets -- 3.2.2 Planning Secrets -- 3.2.3 Stolen Secrets -- 3.2.4 Means-of-Stealing-Secrets Secrets -- 3.3 Confidentiality: Beware the Tyranny of Secrecy -- 3.3.1 Secrecy Is Tenuous -- 3.3.2 Secrecy Is Expensive -- 3.3.3 Secrecy Can Be Self-Defeating -- 3.3.4 Secrecy Is Self-Breeding -- 3.3.5 Secrecy Creates a Form of Corrupting Power and Impediment to Operation -- 3.4 Confidentiality: Changing the Value Proposition -- 3.4.1 Minimize Secrecy and Dependency on Secrecy -- 3.4.2 Minimize Impact of Loss of Secrecy 
588 |a Description based on online resource; title from digital title page (viewed on March 30, 2021). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
776 0 8 |i Print version:  |a Saydjari, O. Sami.  |t Engineering trustworthy systems.  |d New York : McGraw-Hill Education, [2018]  |z 9781260118179  |w (DLC) 2018019355 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781260118186/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH34391982 
938 |a YBP Library Services  |b YANK  |n 16842518 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6258329 
938 |a EBSCOhost  |b EBSC  |n 2687677 
994 |a 92  |b IZTAP