Designing Security Architecture Solutions (PDF)
(Sprache: Englisch)
The first guide to tackle security architecture at the software
engineering level
Computer security has become a critical business concern, and, as
such, the responsibility of all IT professionals. In this
groundbreaking book, a security expert with...
engineering level
Computer security has become a critical business concern, and, as
such, the responsibility of all IT professionals. In this
groundbreaking book, a security expert with...
sofort als Download lieferbar
eBook (pdf)
Fr. 65.00
inkl. MwSt.
- Kreditkarte, Paypal, Rechnung
- Kostenloser tolino webreader
Produktdetails
Produktinformationen zu „Designing Security Architecture Solutions (PDF)“
The first guide to tackle security architecture at the software
engineering level
Computer security has become a critical business concern, and, as
such, the responsibility of all IT professionals. In this
groundbreaking book, a security expert with AT&T Business's
renowned Network Services organization explores system security
architecture from a software engineering perspective. He explains
why strong security must be a guiding principle of the development
process and identifies a common set of features found in most
security products, explaining how they can and should impact the
development cycle. The book also offers in-depth discussions of
security technologies, cryptography, database security, application
and operating system security, and more.
engineering level
Computer security has become a critical business concern, and, as
such, the responsibility of all IT professionals. In this
groundbreaking book, a security expert with AT&T Business's
renowned Network Services organization explores system security
architecture from a software engineering perspective. He explains
why strong security must be a guiding principle of the development
process and identifies a common set of features found in most
security products, explaining how they can and should impact the
development cycle. The book also offers in-depth discussions of
security technologies, cryptography, database security, application
and operating system security, and more.
Inhaltsverzeichnis zu „Designing Security Architecture Solutions (PDF)“
Preface. Acknowledgments. PART I: ARCHITECTURE AND SECURITY. Chapter 1. Architecture Reviews. Chapter 2. Security Assessments. Chapter 3. Security Architecture Basics. Chapter 4. Architecture Patterns in Security. PART II: LOW-LEVEL ARCHITECTURE. Chapter 5. Code Review. Chapter 6. Cryptography. Chapter 7. Trusted Code. Chapter 8. Secure Communications. PART III: MID-LEVEL ARCHITECTURE. Chapter 9. Middleware Security. Chapter 10. Web Security. Chapter 11. Application and OS Security. Chapter 12. Database Security. PART IV: HIGH-LEVEL ARCHITECTURE. Chapter 13. Security Components. Chapter 14. Security and Other Architectural Goals. Chapter 15. Enterprise Security Architecture. PART V: BUSINESS CASES AND SECURITY. Chapter 16. Building Business Cases for Security. Conclusion. Glossary. Bibliography. Index.
Autoren-Porträt von Jay Ramachandran
JAY RAMACHANDRAN is a certified architect and security expert atAT&T, involved in enterprise security architecture and
development. Over the past eight years, he has developed software
and evaluated tools for security assurance, auditing, and
management for many mission-critical network systems. He
coordinated architecture reviews for operations support systems for
AT&T's core network for two years, and currently teaches
workshops on systems architecture and network security. Jay holds a
PhD from Ohio State University.
Bibliographische Angaben
- Autor: Jay Ramachandran
- 2002, 1. Auflage, 480 Seiten, Englisch
- Verlag: John Wiley & Sons
- ISBN-10: 0471430137
- ISBN-13: 9780471430131
- Erscheinungsdatum: 01.10.2002
Abhängig von Bildschirmgrösse und eingestellter Schriftgrösse kann die Seitenzahl auf Ihrem Lesegerät variieren.
eBook Informationen
- Dateiformat: PDF
- Grösse: 2.21 MB
- Mit Kopierschutz
Sprache:
Englisch
Kopierschutz
Dieses eBook können Sie uneingeschränkt auf allen Geräten der tolino Familie lesen. Zum Lesen auf sonstigen eReadern und am PC benötigen Sie eine Adobe ID.
Kommentar zu "Designing Security Architecture Solutions"
0 Gebrauchte Artikel zu „Designing Security Architecture Solutions“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Designing Security Architecture Solutions".
Kommentar verfassen