Book description
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.
Table of contents
- Cover
- Dedication
- Contents (1/2)
- Contents (2/2)
- Foreword
- Foreword
- Preface (1/2)
- Preface (2/2)
- Acknowledgments
- About the Author
- Part I
- Part I: Introduction (1/2)
- Part I: Introduction (2/2)
- Chapter 1: Introduction (1/4)
- Chapter 1: Introduction (2/4)
- Chapter 1: Introduction (3/4)
- Chapter 1: Introduction (4/4)
- Chapter 2: The Art of Security Assessment (1/6)
- Chapter 2: The Art of Security Assessment (2/6)
- Chapter 2: The Art of Security Assessment (3/6)
- Chapter 2: The Art of Security Assessment (4/6)
- Chapter 2: The Art of Security Assessment (5/6)
- Chapter 2: The Art of Security Assessment (6/6)
- Chapter 3: Security Architecture of Systems (1/10)
- Chapter 3: Security Architecture of Systems (2/10)
- Chapter 3: Security Architecture of Systems (3/10)
- Chapter 3: Security Architecture of Systems (4/10)
- Chapter 3: Security Architecture of Systems (5/10)
- Chapter 3: Security Architecture of Systems (6/10)
- Chapter 3: Security Architecture of Systems (7/10)
- Chapter 3: Security Architecture of Systems (8/10)
- Chapter 3: Security Architecture of Systems (9/10)
- Chapter 3: Security Architecture of Systems (10/10)
- Chapter 4: Information Security Risk (1/7)
- Chapter 4: Information Security Risk (2/7)
- Chapter 4: Information Security Risk (3/7)
- Chapter 4: Information Security Risk (4/7)
- Chapter 4: Information Security Risk (5/7)
- Chapter 4: Information Security Risk (6/7)
- Chapter 4: Information Security Risk (7/7)
- Chapter 5: Prepare for Assessment (1/8)
- Chapter 5: Prepare for Assessment (2/8)
- Chapter 5: Prepare for Assessment (3/8)
- Chapter 5: Prepare for Assessment (4/8)
- Chapter 5: Prepare for Assessment (5/8)
- Chapter 5: Prepare for Assessment (6/8)
- Chapter 5: Prepare for Assessment (7/8)
- Chapter 5: Prepare for Assessment (8/8)
- Part I: Summary
- Part II
- Part II: Introduction (1/3)
- Part II: Introduction (2/3)
- Part II: Introduction (3/3)
- Chapter 6: eCommerce Website (1/5)
- Chapter 6: eCommerce Website (2/5)
- Chapter 6: eCommerce Website (3/5)
- Chapter 6: eCommerce Website (4/5)
- Chapter 6: eCommerce Website (5/5)
- Chapter 7: Enterprise Architecture (1/5)
- Chapter 7: Enterprise Architecture (2/5)
- Chapter 7: Enterprise Architecture (3/5)
- Chapter 7: Enterprise Architecture (4/5)
- Chapter 7: Enterprise Architecture (5/5)
- Chapter 8: Business Analytics (1/7)
- Chapter 8: Business Analytics (2/7)
- Chapter 8: Business Analytics (3/7)
- Chapter 8: Business Analytics (4/7)
- Chapter 8: Business Analytics (5/7)
- Chapter 8: Business Analytics (6/7)
- Chapter 8: Business Analytics (7/7)
- Chapter 9: Endpoint Anti-malware (1/4)
- Chapter 9: Endpoint Anti-malware (2/4)
- Chapter 9: Endpoint Anti-malware (3/4)
- Chapter 9: Endpoint Anti-malware (4/4)
- Chapter 10: Mobile Security Software with Cloud Management (1/4)
- Chapter 10: Mobile Security Software with Cloud Management (2/4)
- Chapter 10: Mobile Security Software with Cloud Management (3/4)
- Chapter 10: Mobile Security Software with Cloud Management (4/4)
- Chapter 11: Cloud Software as a Service (SaaS) (1/4)
- Chapter 11: Cloud Software as a Service (SaaS) (2/4)
- Chapter 11: Cloud Software as a Service (SaaS) (3/4)
- Chapter 11: Cloud Software as a Service (SaaS) (4/4)
- Part II: Summary
- Part III
- Part III: Introduction
- Chapter 12: Patterns and Governance Deliver Economies of Scale (1/5)
- Chapter 12: Patterns and Governance Deliver Economies of Scale (2/5)
- Chapter 12: Patterns and Governance Deliver Economies of Scale (3/5)
- Chapter 12: Patterns and Governance Deliver Economies of Scale (4/5)
- Chapter 12: Patterns and Governance Deliver Economies of Scale (5/5)
- Chapter 13: Building an Assessment Program (1/6)
- Chapter 13: Building an Assessment Program (2/6)
- Chapter 13: Building an Assessment Program (3/6)
- Chapter 13: Building an Assessment Program (4/6)
- Chapter 13: Building an Assessment Program (5/6)
- Chapter 13: Building an Assessment Program (6/6)
- Part III: Summary and Afterword
- Back Cover
Product information
- Title: Securing Systems
- Author(s):
- Release date: May 2015
- Publisher(s): CRC Press
- ISBN: 9781482233988
You might also like
book
Practical Internet of Things Security - Second Edition
A practical, indispensable security guide that will navigate you through the complex realm of securely building …
book
Managing Risk in Information Systems, 3rd Edition
Revised and updated with the latest data in the field, the Second Edition of Managing Risk …
book
Application Security Program Handbook
Stop dangerous threats and secure your vulnerabilities without slowing down delivery. This practical book is a …
book
Cybersecurity Law, 2nd Edition
The second edition of the definitive guide to cybersecurity law, updated to reflect recent legal developments …