000 02650nam a22003137a 4500
003 PCN
005 20211005182915.0
008 161024s2016 mdua b 001 0 eng
020 _a9781838989927 (paperback)
040 _erda
050 0 0 _aHV6773
_b.C9174 2016
082 0 0 _a005.8
_223
100 _aMoyle, Ed.
_d1973
_qauthor
245 0 0 _aPractical Cybersecurity Architecture :
_bA guide to creating and implementing robust designs for cybersecurity architects/
_cEd Moyle, Diana Kelley.
264 1 _aBirmingham, UK :
_bPackt Publishing,
_c2020
264 4 _c©2020
300 _av, 399 pages :
_billustrations ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
365 _b271.50
_cRM
504 _aIncludes index.
505 _aSection 1: Security architecture. 1. What is cybersecurity architecture? -- 2. The core of solution building -- Section 2: Building an architecture. 3. Building an architecture : scope and requirements -- 4. Building an architecture : your toolbox -- 5. Building an architecture : developing enterprise blueprints -- 6. Building an architecture : application blueprints -- Section 3: Execution. 7. Execution : applying architecture models -- 8. Execution : future-proofing -- 9. Putting it all together.
520 _aCybersecurity architects work with others to develope a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through onging monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.
_cProvided by Publisher.
650 0 _aComputer security
_xDesign and construction
650 0 _aComputer networks
_xSecurity measures
_yDesign and construction
700 1 _aDiana, Kelly
_d1965
_qauthor
942 _2ddc
_cOPEN SHELF
999 _c456
_d456