Practical Cybersecurity Architecture : (Record no. 456)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02650nam a22003137a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | PCN |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20211005182915.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 161024s2016 mdua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781838989927 (paperback) |
040 ## - CATALOGING SOURCE | |
Description conventions | rda |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV6773 |
Item number | .C9174 2016 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Moyle, Ed. |
Dates associated with a name | 1973 |
Fuller form of name | author |
245 00 - TITLE STATEMENT | |
Title | Practical Cybersecurity Architecture : |
Remainder of title | A guide to creating and implementing robust designs for cybersecurity architects/ |
Statement of responsibility, etc. | Ed Moyle, Diana Kelley. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Birmingham, UK : |
Name of producer, publisher, distributor, manufacturer | Packt Publishing, |
Date of production, publication, distribution, manufacture, or copyright notice | 2020 |
Date of production, publication, distribution, manufacture, or copyright notice | ©2020 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | v, 399 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | unmediated |
Media type code | n |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | volume |
Carrier type code | nc |
Source | rdacarrier |
365 ## - TRADE PRICE | |
Price amount | 271.50 |
Currency code | RM |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Section 1: Security architecture. 1. What is cybersecurity architecture? --<br/>2. The core of solution building --<br/>Section 2: Building an architecture. 3. Building an architecture : scope and requirements --<br/>4. Building an architecture : your toolbox --<br/>5. Building an architecture : developing enterprise blueprints --<br/>6. Building an architecture : application blueprints --<br/>Section 3: Execution. 7. Execution : applying architecture models --<br/>8. Execution : future-proofing --<br/>9. Putting it all together. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Cybersecurity architects work with others to develope a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through onging monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others. |
Assigning source | Provided by Publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
General subdivision | Design and construction |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures |
Chronological subdivision | Design and construction |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Diana, Kelly |
Dates associated with a name | 1965 |
Fuller form of name | author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | ACADEMIC |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Inventory number | Full call number | Barcode | Date last seen | Copy number | Cost, replacement price | Price effective from | Koha item type | Total Checkouts | Uniform Resource Identifier |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | FRANCIS LIGHT LIBRARY | FRANCIS LIGHT LIBRARY | SHELVES 1 | 05/10/2021 | EMO BOOKS SERVICES (IV-001277 : PCN2104053) | 271.50 | 456 | 005.8 MOY | 00000522 | 05/10/2021 | 1 | 301.50 | 05/10/2021 | ACADEMIC | ||||||
Dewey Decimal Classification | FRANCIS LIGHT LIBRARY | FRANCIS LIGHT LIBRARY | SHELVES 1 | 05/10/2021 | EMO BOOKS SERVICES (IV-001277 : PCN2104053) | 271.50 | 456 | 005.8 MOY | 00000523 | 05/10/2021 | 2 | 301.50 | 05/10/2021 | ACADEMIC | ||||||
Dewey Decimal Classification | FRANCIS LIGHT LIBRARY | FRANCIS LIGHT LIBRARY | 20/09/2024 | 20/09/2024 | 20/09/2024 | BOOK GPS | https://drive.google.com/file/d/1q6CpkS3FGYcY3CTIbvoJLVL-6hwO19eu/view?usp=sharing |