SICHERUNGSSYSTEME ANGEWANDTE SICHERHEITSARCHITEKTUR & BEDROHUNGSMODELLE - SCHOENFIELD HC-

Ursprünglicher Text
SECURING SYSTEMS APPLIED SECURITY ARCHITECTURE & THREAT MODELS - SCHOENFIELD HC
moon_resources
(1391)
Angemeldet als gewerblicher Verkäufer
US $24,79
Ca.EUR 21,34
(US $24,79 / Unit)
Artikelzustand:
Gut
Schnell, bevor er weg ist. 1 Person beobachtet diesen Artikel.
Ganz entspannt. Rückgaben akzeptiert.
Versand:
US $11,42 (ca. EUR 9,83) USPS Ground Advantage®.
Standort: Simpsonville, South Carolina, USA
Lieferung:
Lieferung zwischen Sa, 18. Okt und Fr, 24. Okt nach 94104 bei heutigem Zahlungseingang
Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
14 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
   Diners Club 

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet

  • Gratis Rückversand im Inland
  • Punkte für jeden Kauf und Verkauf
  • Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:197684608766
Zuletzt aktualisiert am 23. Sep. 2025 05:45:16 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Artikelmerkmale

Artikelzustand
Gut: Buch, das gelesen wurde, sich aber in einem guten Zustand befindet. Der Einband weist nur sehr ...
Series
Software Engineering
Educational Level
Adult & Further Education
Personalized
No
Features
Illustrated
Country/Region of Manufacture
United States
ISBN
9781482233971
Kategorie

Über dieses Produkt

Product Identifiers

Publisher
Taylor & Francis Group
ISBN-10
1482233975
ISBN-13
9781482233971
eBay Product ID (ePID)
211899838

Product Key Features

Number of Pages
440 Pages
Language
English
Publication Name
Securing Systems : Applied Security Architecture and Threat Models
Publication Year
2015
Subject
Software Development & Engineering / General, Security / Networking, Software Development & Engineering / Systems Analysis & Design, Information Technology
Type
Textbook
Author
Brook S. E. Schoenfield
Subject Area
Computers
Format
Hardcover

Dimensions

Item Height
1.2 in
Item Weight
34.3 Oz
Item Length
10.3 in
Item Width
7.2 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2015-012502
Reviews
"Brook Schoenfield has distilled a tremendous amount of practical experience and critical thinking about security architecture into a resource that should be extremely helpful to practitioners." -- Jack Jones, Originator of The Open Group Standard, Factor Analysis for Information Risk (FAIR) "Five stars for Brook Schoenfield who has created a one-stop resource for both the security strategist/technologist and the executive suite, sounding the 'proactive' klaxon. The reader is given substantive exemplars on the practicality of architecting security solutions into the mix from the get-go, and obviating the tendency to 'bolt on' security at a later date. Securing Systems should be on every CSO's and CISO's desk, and referenced often as teams are built and security solutions architected." -- Christopher Burgess, CEO, Prevendra Inc, Author of Secrets Stolen, Fortunes Lost and Protecting Intellectual Property "Brook Schoenfield's approach to securing systems addresses the entire enterprise, not only its digital systems, as well as the processes and people who will interact, design, and build the systems. This book fills a significant gap in the literature and is appropriate for use as a resource for both aspiring and seasoned security architects alike." -- Dr. James F. Ransome, CISSP, CISM, Senior Director of Product Security at Intel Security Group and Co-Author of Core Software Security "It is not good enough just to build something and try and secure it, it must be architected from the bottom up with security in it, by professionally trained and skilled security architects, checked and validated by regular assessments for weakness, and through a learning system that learns from today to inform tomorrow. We must succeed." -- John N. Stewart, SVP & Chief Security Officer, Cisco Security and Trust Organization and Winner of the CSO 40 Silver Award for the 2014 Chief Security Officer of the Year "This book describes well why some companies are successful and some are not in the area of software security. Brook writes this book out of his own experiences from many years in the trade. I doubt that you can find many who have more years of great achievements in his field. By reading this book, you will get a fast track to build competence in a very advanced area. The possibilities to take the wrong route are much wider than you can imagine. Please do like me-- read it and think how I can improve my daily business from what I have learned." -- Per-Olof Persson, Head of Software Security, Sony Mobile
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Introduction. The Art of Security Assessment. Security Architecture of Systems. Information Security Risk. Prepare for Assessment. eCommerce Website. Enterprise Architecture. Business Analytics. Endpoint Anti-malware. Mobile Security Software with Cloud Management. Cloud Software as a Service (SaaS). Patterns and Governance Deliver Economies of Scale.
Synopsis
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle., Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis: When should the security architect begin the analysis? At what points can a security architect add the most value? What are the activities the architect must execute? How are these activities delivered? What is the set of knowledge domains applied to the analysis? What are the outputs? What are the tips and tricks that make security architecture risk assessment easier? To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you've seen a sufficient diversity of architectures, you'll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.
LC Classification Number
TK5105.59.S356 2015

Artikelbeschreibung des Verkäufers

Rechtliche Informationen des Verkäufers

Ich versichere, dass alle meine Verkaufsaktivitäten in Übereinstimmung mit allen geltenden Gesetzen und Vorschriften der EU erfolgen.
Info zu diesem Verkäufer

moon_resources

100% positive Bewertungen3.527 Artikel verkauft

Mitglied seit Mai 1999
Angemeldet als gewerblicher Verkäufer
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.9
Angemessene Versandkosten
4.8
Lieferzeit
5.0
Kommunikation
5.0

Verkäuferbewertungen (1.021)

Alle Bewertungenselected
Positiv
Neutral
Negativ
  • 3***1 (208)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    A+++ Awesome seller sent package out immediately. Communication was incredible and product came just as described and the prices are more than fair. Not like other sellers that charge for that one thing you can’t find thanks again appreciate it.
  • 5***g (48)- Bewertung vom Käufer.
    Letzter Monat
    Bestätigter Kauf
    Item arrived quickly, exactly as described, well packaged, and in great condition. A very good value!
  • u***w (373)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    Fast shipping! Great packaging! Item as described! Looks like new and very good price! Thank you!!!