Book description
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of as
Table of contents
- Cover
- Dedication
- Contents (1/2)
- Contents (2/2)
- Foreword
- Foreword
- Preface (1/2)
- Preface (2/2)
- Acknowledgments
- About the Author
- Part I
- Part I: Introduction (1/2)
- Part I: Introduction (2/2)
- Chapter 1: Introduction (1/4)
- Chapter 1: Introduction (2/4)
- Chapter 1: Introduction (3/4)
- Chapter 1: Introduction (4/4)
- Chapter 2: The Art of Security Assessment (1/6)
- Chapter 2: The Art of Security Assessment (2/6)
- Chapter 2: The Art of Security Assessment (3/6)
- Chapter 2: The Art of Security Assessment (4/6)
- Chapter 2: The Art of Security Assessment (5/6)
- Chapter 2: The Art of Security Assessment (6/6)
- Chapter 3: Security Architecture of Systems (1/10)
- Chapter 3: Security Architecture of Systems (2/10)
- Chapter 3: Security Architecture of Systems (3/10)
- Chapter 3: Security Architecture of Systems (4/10)
- Chapter 3: Security Architecture of Systems (5/10)
- Chapter 3: Security Architecture of Systems (6/10)
- Chapter 3: Security Architecture of Systems (7/10)
- Chapter 3: Security Architecture of Systems (8/10)
- Chapter 3: Security Architecture of Systems (9/10)
- Chapter 3: Security Architecture of Systems (10/10)
- Chapter 4: Information Security Risk (1/7)
- Chapter 4: Information Security Risk (2/7)
- Chapter 4: Information Security Risk (3/7)
- Chapter 4: Information Security Risk (4/7)
- Chapter 4: Information Security Risk (5/7)
- Chapter 4: Information Security Risk (6/7)
- Chapter 4: Information Security Risk (7/7)
- Chapter 5: Prepare for Assessment (1/8)
- Chapter 5: Prepare for Assessment (2/8)
- Chapter 5: Prepare for Assessment (3/8)
- Chapter 5: Prepare for Assessment (4/8)
- Chapter 5: Prepare for Assessment (5/8)
- Chapter 5: Prepare for Assessment (6/8)
- Chapter 5: Prepare for Assessment (7/8)
- Chapter 5: Prepare for Assessment (8/8)
- Part I: Summary
- Part II
- Part II: Introduction (1/3)
- Part II: Introduction (2/3)
- Part II: Introduction (3/3)
- Chapter 6: eCommerce Website (1/5)
- Chapter 6: eCommerce Website (2/5)
- Chapter 6: eCommerce Website (3/5)
- Chapter 6: eCommerce Website (4/5)
- Chapter 6: eCommerce Website (5/5)
- Chapter 7: Enterprise Architecture (1/5)
- Chapter 7: Enterprise Architecture (2/5)
- Chapter 7: Enterprise Architecture (3/5)
- Chapter 7: Enterprise Architecture (4/5)
- Chapter 7: Enterprise Architecture (5/5)
- Chapter 8: Business Analytics (1/7)
- Chapter 8: Business Analytics (2/7)
- Chapter 8: Business Analytics (3/7)
- Chapter 8: Business Analytics (4/7)
- Chapter 8: Business Analytics (5/7)
- Chapter 8: Business Analytics (6/7)
- Chapter 8: Business Analytics (7/7)
- Chapter 9: Endpoint Anti-malware (1/4)
- Chapter 9: Endpoint Anti-malware (2/4)
- Chapter 9: Endpoint Anti-malware (3/4)
- Chapter 9: Endpoint Anti-malware (4/4)
- Chapter 10: Mobile Security Software with Cloud Management (1/4)
- Chapter 10: Mobile Security Software with Cloud Management (2/4)
- Chapter 10: Mobile Security Software with Cloud Management (3/4)
- Chapter 10: Mobile Security Software with Cloud Management (4/4)
- Chapter 11: Cloud Software as a Service (SaaS) (1/4)
- Chapter 11: Cloud Software as a Service (SaaS) (2/4)
- Chapter 11: Cloud Software as a Service (SaaS) (3/4)
- Chapter 11: Cloud Software as a Service (SaaS) (4/4)
- Part II: Summary
- Part III
- Part III: Introduction
- Chapter 12: Patterns and Governance Deliver Economies of Scale (1/5)
- Chapter 12: Patterns and Governance Deliver Economies of Scale (2/5)
- Chapter 12: Patterns and Governance Deliver Economies of Scale (3/5)
- Chapter 12: Patterns and Governance Deliver Economies of Scale (4/5)
- Chapter 12: Patterns and Governance Deliver Economies of Scale (5/5)
- Chapter 13: Building an Assessment Program (1/6)
- Chapter 13: Building an Assessment Program (2/6)
- Chapter 13: Building an Assessment Program (3/6)
- Chapter 13: Building an Assessment Program (4/6)
- Chapter 13: Building an Assessment Program (5/6)
- Chapter 13: Building an Assessment Program (6/6)
- Part III: Summary and Afterword
- Back Cover
Product information
- Title: Securing Systems
- Author(s):
- Release date: May 2015
- Publisher(s): CRC Press
- ISBN: 9781482233988
You might also like
book
Practical Cloud Security
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and …
book
Infrastructure as Code, 2nd Edition
Six years ago, Infrastructure as Code was a new concept. Today, as even banks and other …
book
Securing DevOps
Securing DevOps explores how the techniques of DevOps and security should be applied together to make …
book
Shifting Left for Application Security
Security is a paramount concern for developers, operations and security engineers, and company CISOs alike. Security …