000 | 02650nam a22003137a 4500 | ||
---|---|---|---|
003 | PCN | ||
005 | 20211005182915.0 | ||
008 | 161024s2016 mdua b 001 0 eng | ||
020 | _a9781838989927 (paperback) | ||
040 | _erda | ||
050 | 0 | 0 |
_aHV6773 _b.C9174 2016 |
082 | 0 | 0 |
_a005.8 _223 |
100 |
_aMoyle, Ed. _d1973 _qauthor |
||
245 | 0 | 0 |
_aPractical Cybersecurity Architecture : _bA guide to creating and implementing robust designs for cybersecurity architects/ _cEd Moyle, Diana Kelley. |
264 | 1 |
_aBirmingham, UK : _bPackt Publishing, _c2020 |
|
264 | 4 | _c©2020 | |
300 |
_av, 399 pages : _billustrations ; _c24 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
365 |
_b271.50 _cRM |
||
504 | _aIncludes index. | ||
505 | _aSection 1: Security architecture. 1. What is cybersecurity architecture? -- 2. The core of solution building -- Section 2: Building an architecture. 3. Building an architecture : scope and requirements -- 4. Building an architecture : your toolbox -- 5. Building an architecture : developing enterprise blueprints -- 6. Building an architecture : application blueprints -- Section 3: Execution. 7. Execution : applying architecture models -- 8. Execution : future-proofing -- 9. Putting it all together. | ||
520 |
_aCybersecurity architects work with others to develope a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through onging monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others. _cProvided by Publisher. |
||
650 | 0 |
_aComputer security _xDesign and construction |
|
650 | 0 |
_aComputer networks _xSecurity measures _yDesign and construction |
|
700 | 1 |
_aDiana, Kelly _d1965 _qauthor |
|
942 |
_2ddc _cOPEN SHELF |
||
999 |
_c456 _d456 |