ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Programming / Systems Analysis & Design

Securing Systems: Applied Security Architecture and Threat Models

| £58.28 | €65.55 | Ca$94.56 | Au$93.32
by Brook S. E. Schoenfield
What is this?DRM-PDF | by download   add to wish list
Securing Systems: Applied Security Architecture and Threat Models by Brook S. E. Schoenfield

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.

Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis:

  • When should the security architect begin the analysis?
  • At what points can a security architect add the most value?
  • What are the activities the architect must execute?
  • How are these activities delivered?
  • What is the set of knowledge domains applied to the analysis?
  • What are the outputs?
  • What are the tips and tricks that make security architecture risk assessment easier?

To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you've seen a sufficient diversity of architectures, you'll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 748438

Ebook Details
Pages: 440
Size: 21.0 MB
Publisher: CRC Press
Date published:   2015
ISBN: 9781482233988 (DRM-PDF)

DRM Settings
Copying:not allowed
Printing:not allowed
Read Aloud:  not allowed

This product is listed in the following categories:

Nonfiction > Computers > Security
Nonfiction > Computers > Programming > Software Development
Nonfiction > Computers > Programming > Systems Analysis & Design

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

© 2016