0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking

Buy Now

Securing Systems - Applied Security Architecture and Threat Models (Hardcover) Loot Price: R4,025
Discovery Miles 40 250
Securing Systems - Applied Security Architecture and Threat Models (Hardcover): Brook S. E. Schoenfield

Securing Systems - Applied Security Architecture and Threat Models (Hardcover)

Brook S. E. Schoenfield

 (sign in to rate)
Loot Price R4,025 Discovery Miles 40 250 | Repayment Terms: R377 pm x 12*

Bookmark and Share

Expected to ship within 12 - 17 working days

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis: When should the security architect begin the analysis? At what points can a security architect add the most value? What are the activities the architect must execute? How are these activities delivered? What is the set of knowledge domains applied to the analysis? What are the outputs? What are the tips and tricks that make security architecture risk assessment easier? To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you've seen a sufficient diversity of architectures, you'll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.

General

Imprint: Apple Academic Press Inc.
Country of origin: Canada
Release date: May 2015
First published: 2015
Authors: Brook S. E. Schoenfield
Dimensions: 254 x 178 x 32mm (L x W x T)
Format: Hardcover
Pages: 440
ISBN-13: 978-1-4822-3397-1
Categories: Books > Computing & IT > Computer hardware & operating systems > Systems management
Books > Computing & IT > Computer communications & networking > General
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
LSN: 1-4822-3397-5
Barcode: 9781482233971

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners