Securing systems applied security architecture and threat models

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This...

Descripción completa

Detalles Bibliográficos
Otros Autores: Schoenfield, Brook S. E., author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton, Florida : Taylor & Francis, CRC Press [2015]
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629806806719
Tabla de Contenidos:
  • ""Cover""; ""Dedication""; ""Contents""; ""Foreword""; ""Foreword""; ""Preface""; ""Acknowledgments""; ""About the Author""; ""Part I""; ""Part I: Introduction""; ""Chapter 1: Introduction""; ""Chapter 2: The Art of Security Assessment""; ""Chapter 3: Security Architecture of Systems""; ""Chapter 4: Information Security Risk""; ""Chapter 5: Prepare for Assessment""; ""Part I: Summary""; ""Part II""; ""Part II: Introduction""; ""Chapter 6: eCommerce Website""; ""Chapter 7: Enterprise Architecture""; ""Chapter 8: Business Analytics""; ""Chapter 9: Endpoint Anti-malware""
  • ""Chapter 10: Mobile Security Software with Cloud Management""""Chapter 11: Cloud Software as a Service (SaaS)""; ""Part II: Summary""; ""Part III""; ""Part III: Introduction""; ""Chapter 12: Patterns and Governance Deliver Economies of Scale""; ""Chapter 13: Building an Assessment Program""; ""Part III: Summary and Afterword""; ""Back Cover""