Securing systems applied security architecture and threat models

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This...

Descripción completa

Detalles Bibliográficos
Otros Autores: Schoenfield, Brook S. E., author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton, Florida : Taylor & Francis, CRC Press [2015]
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629806806719
Descripción
Sumario:Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.Securing System
Notas:Description based upon print version of record.
Descripción Física:1 online resource (440 p.)
Bibliografía:Includes bibliographical references at the end of each chapters.
ISBN:9781040054826
9780429069260