Book description
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.
Table of contents
- Cover
- Dedication
- Contents (1/2)
- Contents (2/2)
- Foreword
- Foreword
- Preface (1/2)
- Preface (2/2)
- Acknowledgments
- About the Author
- Part I
- Part I: Introduction (1/2)
- Part I: Introduction (2/2)
- Chapter 1: Introduction (1/4)
- Chapter 1: Introduction (2/4)
- Chapter 1: Introduction (3/4)
- Chapter 1: Introduction (4/4)
- Chapter 2: The Art of Security Assessment (1/6)
- Chapter 2: The Art of Security Assessment (2/6)
- Chapter 2: The Art of Security Assessment (3/6)
- Chapter 2: The Art of Security Assessment (4/6)
- Chapter 2: The Art of Security Assessment (5/6)
- Chapter 2: The Art of Security Assessment (6/6)
- Chapter 3: Security Architecture of Systems (1/10)
- Chapter 3: Security Architecture of Systems (2/10)
- Chapter 3: Security Architecture of Systems (3/10)
- Chapter 3: Security Architecture of Systems (4/10)
- Chapter 3: Security Architecture of Systems (5/10)
- Chapter 3: Security Architecture of Systems (6/10)
- Chapter 3: Security Architecture of Systems (7/10)
- Chapter 3: Security Architecture of Systems (8/10)
- Chapter 3: Security Architecture of Systems (9/10)
- Chapter 3: Security Architecture of Systems (10/10)
- Chapter 4: Information Security Risk (1/7)
- Chapter 4: Information Security Risk (2/7)
- Chapter 4: Information Security Risk (3/7)
- Chapter 4: Information Security Risk (4/7)
- Chapter 4: Information Security Risk (5/7)
- Chapter 4: Information Security Risk (6/7)
- Chapter 4: Information Security Risk (7/7)
- Chapter 5: Prepare for Assessment (1/8)
- Chapter 5: Prepare for Assessment (2/8)
- Chapter 5: Prepare for Assessment (3/8)
- Chapter 5: Prepare for Assessment (4/8)
- Chapter 5: Prepare for Assessment (5/8)
- Chapter 5: Prepare for Assessment (6/8)
- Chapter 5: Prepare for Assessment (7/8)
- Chapter 5: Prepare for Assessment (8/8)
- Part I: Summary
- Part II
- Part II: Introduction (1/3)
- Part II: Introduction (2/3)
- Part II: Introduction (3/3)
- Chapter 6: eCommerce Website (1/5)
- Chapter 6: eCommerce Website (2/5)
- Chapter 6: eCommerce Website (3/5)
- Chapter 6: eCommerce Website (4/5)
- Chapter 6: eCommerce Website (5/5)
- Chapter 7: Enterprise Architecture (1/5)
- Chapter 7: Enterprise Architecture (2/5)
- Chapter 7: Enterprise Architecture (3/5)
- Chapter 7: Enterprise Architecture (4/5)
- Chapter 7: Enterprise Architecture (5/5)
- Chapter 8: Business Analytics (1/7)
- Chapter 8: Business Analytics (2/7)
- Chapter 8: Business Analytics (3/7)
- Chapter 8: Business Analytics (4/7)
- Chapter 8: Business Analytics (5/7)
- Chapter 8: Business Analytics (6/7)
- Chapter 8: Business Analytics (7/7)
- Chapter 9: Endpoint Anti-malware (1/4)
- Chapter 9: Endpoint Anti-malware (2/4)
- Chapter 9: Endpoint Anti-malware (3/4)
- Chapter 9: Endpoint Anti-malware (4/4)
- Chapter 10: Mobile Security Software with Cloud Management (1/4)
- Chapter 10: Mobile Security Software with Cloud Management (2/4)
- Chapter 10: Mobile Security Software with Cloud Management (3/4)
- Chapter 10: Mobile Security Software with Cloud Management (4/4)
- Chapter 11: Cloud Software as a Service (SaaS) (1/4)
- Chapter 11: Cloud Software as a Service (SaaS) (2/4)
- Chapter 11: Cloud Software as a Service (SaaS) (3/4)
- Chapter 11: Cloud Software as a Service (SaaS) (4/4)
- Part II: Summary
- Part III
- Part III: Introduction
- Chapter 12: Patterns and Governance Deliver Economies of Scale (1/5)
- Chapter 12: Patterns and Governance Deliver Economies of Scale (2/5)
- Chapter 12: Patterns and Governance Deliver Economies of Scale (3/5)
- Chapter 12: Patterns and Governance Deliver Economies of Scale (4/5)
- Chapter 12: Patterns and Governance Deliver Economies of Scale (5/5)
- Chapter 13: Building an Assessment Program (1/6)
- Chapter 13: Building an Assessment Program (2/6)
- Chapter 13: Building an Assessment Program (3/6)
- Chapter 13: Building an Assessment Program (4/6)
- Chapter 13: Building an Assessment Program (5/6)
- Chapter 13: Building an Assessment Program (6/6)
- Part III: Summary and Afterword
- Back Cover
Product information
- Title: Securing Systems
- Author(s):
- Release date: May 2015
- Publisher(s): CRC Press
- ISBN: 9781482233988
You might also like
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Bring Your Own Devices (BYOD) Survival Guide
Where end-users once queued up to ask the IT department for permission to buy a new …
book
Cybersecurity Law, 2nd Edition
The second edition of the definitive guide to cybersecurity law, updated to reflect recent legal developments …
book
Enhanced Cyber Security with IBM Spectrum Scale and IBM QRadar
Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management software for …