Securing Systems

Book description

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.

Table of contents

  1. Cover
  2. Dedication
  3. Contents (1/2)
  4. Contents (2/2)
  5. Foreword
  6. Foreword
  7. Preface (1/2)
  8. Preface (2/2)
  9. Acknowledgments
  10. About the Author
  11. Part I
  12. Part I: Introduction (1/2)
  13. Part I: Introduction (2/2)
  14. Chapter 1: Introduction (1/4)
  15. Chapter 1: Introduction (2/4)
  16. Chapter 1: Introduction (3/4)
  17. Chapter 1: Introduction (4/4)
  18. Chapter 2: The Art of Security Assessment (1/6)
  19. Chapter 2: The Art of Security Assessment (2/6)
  20. Chapter 2: The Art of Security Assessment (3/6)
  21. Chapter 2: The Art of Security Assessment (4/6)
  22. Chapter 2: The Art of Security Assessment (5/6)
  23. Chapter 2: The Art of Security Assessment (6/6)
  24. Chapter 3: Security Architecture of Systems (1/10)
  25. Chapter 3: Security Architecture of Systems (2/10)
  26. Chapter 3: Security Architecture of Systems (3/10)
  27. Chapter 3: Security Architecture of Systems (4/10)
  28. Chapter 3: Security Architecture of Systems (5/10)
  29. Chapter 3: Security Architecture of Systems (6/10)
  30. Chapter 3: Security Architecture of Systems (7/10)
  31. Chapter 3: Security Architecture of Systems (8/10)
  32. Chapter 3: Security Architecture of Systems (9/10)
  33. Chapter 3: Security Architecture of Systems (10/10)
  34. Chapter 4: Information Security Risk (1/7)
  35. Chapter 4: Information Security Risk (2/7)
  36. Chapter 4: Information Security Risk (3/7)
  37. Chapter 4: Information Security Risk (4/7)
  38. Chapter 4: Information Security Risk (5/7)
  39. Chapter 4: Information Security Risk (6/7)
  40. Chapter 4: Information Security Risk (7/7)
  41. Chapter 5: Prepare for Assessment (1/8)
  42. Chapter 5: Prepare for Assessment (2/8)
  43. Chapter 5: Prepare for Assessment (3/8)
  44. Chapter 5: Prepare for Assessment (4/8)
  45. Chapter 5: Prepare for Assessment (5/8)
  46. Chapter 5: Prepare for Assessment (6/8)
  47. Chapter 5: Prepare for Assessment (7/8)
  48. Chapter 5: Prepare for Assessment (8/8)
  49. Part I: Summary
  50. Part II
  51. Part II: Introduction (1/3)
  52. Part II: Introduction (2/3)
  53. Part II: Introduction (3/3)
  54. Chapter 6: eCommerce Website (1/5)
  55. Chapter 6: eCommerce Website (2/5)
  56. Chapter 6: eCommerce Website (3/5)
  57. Chapter 6: eCommerce Website (4/5)
  58. Chapter 6: eCommerce Website (5/5)
  59. Chapter 7: Enterprise Architecture (1/5)
  60. Chapter 7: Enterprise Architecture (2/5)
  61. Chapter 7: Enterprise Architecture (3/5)
  62. Chapter 7: Enterprise Architecture (4/5)
  63. Chapter 7: Enterprise Architecture (5/5)
  64. Chapter 8: Business Analytics (1/7)
  65. Chapter 8: Business Analytics (2/7)
  66. Chapter 8: Business Analytics (3/7)
  67. Chapter 8: Business Analytics (4/7)
  68. Chapter 8: Business Analytics (5/7)
  69. Chapter 8: Business Analytics (6/7)
  70. Chapter 8: Business Analytics (7/7)
  71. Chapter 9: Endpoint Anti-malware (1/4)
  72. Chapter 9: Endpoint Anti-malware (2/4)
  73. Chapter 9: Endpoint Anti-malware (3/4)
  74. Chapter 9: Endpoint Anti-malware (4/4)
  75. Chapter 10: Mobile Security Software with Cloud Management (1/4)
  76. Chapter 10: Mobile Security Software with Cloud Management (2/4)
  77. Chapter 10: Mobile Security Software with Cloud Management (3/4)
  78. Chapter 10: Mobile Security Software with Cloud Management (4/4)
  79. Chapter 11: Cloud Software as a Service (SaaS) (1/4)
  80. Chapter 11: Cloud Software as a Service (SaaS) (2/4)
  81. Chapter 11: Cloud Software as a Service (SaaS) (3/4)
  82. Chapter 11: Cloud Software as a Service (SaaS) (4/4)
  83. Part II: Summary
  84. Part III
  85. Part III: Introduction
  86. Chapter 12: Patterns and Governance Deliver Economies of Scale (1/5)
  87. Chapter 12: Patterns and Governance Deliver Economies of Scale (2/5)
  88. Chapter 12: Patterns and Governance Deliver Economies of Scale (3/5)
  89. Chapter 12: Patterns and Governance Deliver Economies of Scale (4/5)
  90. Chapter 12: Patterns and Governance Deliver Economies of Scale (5/5)
  91. Chapter 13: Building an Assessment Program (1/6)
  92. Chapter 13: Building an Assessment Program (2/6)
  93. Chapter 13: Building an Assessment Program (3/6)
  94. Chapter 13: Building an Assessment Program (4/6)
  95. Chapter 13: Building an Assessment Program (5/6)
  96. Chapter 13: Building an Assessment Program (6/6)
  97. Part III: Summary and Afterword
  98. Back Cover

Product information

  • Title: Securing Systems
  • Author(s): Brook E. Schoenfield
  • Release date: May 2015
  • Publisher(s): CRC Press
  • ISBN: 9781482233988