Loading…

Securing systems : applied security architecture and threat models /

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Schoenfield, Brook S. E. (Author)
Other Authors: Stewart, John N. (writer of foreword.), Ransome, James F. (writer of foreword.)
Format: Electronic eBook
Language:Inglés
Published: Boca Raton : CRC Press, [2015]
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • Cover; Dedication; Contents; Foreword; Foreword; Preface; Acknowledgments; About the Author; Part I; Part I: Introduction; Chapter 1: Introduction; Chapter 2: The Art of Security Assessment; Chapter 3: Security Architecture of Systems; Chapter 4: Information Security Risk; Chapter 5: Prepare for Assessment; Part I: Summary; Part II; Part II: Introduction; Chapter 6: eCommerce Website; Chapter 7: Enterprise Architecture; Chapter 8: Business Analytics; Chapter 9: Endpoint Anti-malware; Chapter 10: Mobile Security Software with Cloud Management; Chapter 11: Cloud Software as a Service (SaaS).
  • Part II: SummaryPart III; Part III: Introduction; Chapter 12: Patterns and Governance Deliver Economies of Scale; Chapter 13: Building an Assessment Program; Part III: Summary and Afterword; Back Cover.