November 2018
Intermediate to advanced
382 pages
11h 20m
English
Faced with building out a security architecture against the diagrammed system, one must remember that tailoring a security architecture is really more about assembling the primitive security constructs and services from your CSP than inventing or adapting everything from scratch.
That said, the following activities—some of which have been discussed in detail in this book (and so are not listed in as much detail here)—are strongly advised: