Welcome to Francis Light Library | francislightlibrary@peninsulamalaysia.edu.my | +604-545 600 EXt:8004
Image from Google Jackets

Practical Cybersecurity Architecture : A guide to creating and implementing robust designs for cybersecurity architects/ Ed Moyle, Diana Kelley.

By: Contributor(s): Publisher: Birmingham, UK : Packt Publishing, 2020Copyright date: ©2020Description: v, 399 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781838989927 (paperback)
Subject(s): DDC classification:
  • 005.8 23
LOC classification:
  • HV6773 .C9174 2016
Contents:
Section 1: Security architecture. 1. What is cybersecurity architecture? -- 2. The core of solution building -- Section 2: Building an architecture. 3. Building an architecture : scope and requirements -- 4. Building an architecture : your toolbox -- 5. Building an architecture : developing enterprise blueprints -- 6. Building an architecture : application blueprints -- Section 3: Execution. 7. Execution : applying architecture models -- 8. Execution : future-proofing -- 9. Putting it all together.
Summary: Cybersecurity architects work with others to develope a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through onging monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others. Provided by Publisher.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Shelving location Call number URL Copy number Status Date due Barcode Course reserves
BOOK GPS BOOK GPS FRANCIS LIGHT LIBRARY Link to resource Not for loan
ACADEMIC ACADEMIC FRANCIS LIGHT LIBRARY SHELVES 1 005.8 MOY (Browse shelf(Opens below)) 1 Available 00000522

Bsc (Hons) Cyber Security

ACADEMIC ACADEMIC FRANCIS LIGHT LIBRARY SHELVES 1 005.8 MOY (Browse shelf(Opens below)) 2 Available 00000523

Bsc (Hons) Cyber Security

Includes index.

Section 1: Security architecture. 1. What is cybersecurity architecture? --
2. The core of solution building --
Section 2: Building an architecture. 3. Building an architecture : scope and requirements --
4. Building an architecture : your toolbox --
5. Building an architecture : developing enterprise blueprints --
6. Building an architecture : application blueprints --
Section 3: Execution. 7. Execution : applying architecture models --
8. Execution : future-proofing --
9. Putting it all together.

Cybersecurity architects work with others to develope a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through onging monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others. Provided by Publisher.

There are no comments on this title.

to post a comment.

The Ship Campus, No.1 Education Boulevard,One Auto Hub, Batu Kawan Industrial Park,14110, Bandar Cassia, Penang,Malaysia.Phone: +604 585 5000 Fax: +604 585 5009 | Email: noorshahidah@penisulacollege.edu.my 

Powered by KOHA |© Maintained by WISERF