Secrets of a Cyber Security Architect (Record no. 232)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02054nam a22002537a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240822113749.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240813b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781032475028 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | SIU |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 SCH 2023 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | SCHOENFIELD, BROOK S. E. |
245 ## - TITLE STATEMENT | |
Title | Secrets of a Cyber Security Architect |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | AUERBACH |
Name of publisher, distributor, etc. | AUERBACH PUBLICATIONS, [S.l.], |
Date of publication, distribution, etc. | 2023 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 250 pages illustrations (black and white) ; 26 cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Introduction. What Is This Thing Called "Security Architecture"?. What Is Security Assessment. Architecture Risk Assessment. Threat Modeling. ATASM. Background knowledge: The Three S’s. Architecture. Threats. Attack Surfaces. Mitigations. Requirements. Security Architecture |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | What security architecture is and the areas of expertise a security architect needs in practice<br/><br/><br/>The relationship between attack methods and the art of building cyber defenses<br/><br/><br/>Why to use attacks and how to derive a set of mitigations and defenses<br/><br/><br/>Approaches, tricks, and manipulations proven successful for practicing security architecture<br/><br/><br/>Starting, maturing, and running effective security architecture programs<br/><br/><br/>Secrets of the trade for the practicing security architecture<br/><br/><br/>Tricks to surmount typical problems<br/><br/><br/>Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book is filled with techniques, tips, and tricks that secure software architects and developers can apply directly. From assessing the sensitivity of data in a system through actually getting requirements implemented, this book offers readers practical, how-to advice in small, focused and directly applicable gems of insight, knowledge |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
General subdivision | Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
General subdivision | Security Architecture |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
General subdivision | Security Assessment |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
General subdivision | Hacking Prevention |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book |
Suppress in OPAC | No |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Symbiosis International University, Dubai | Symbiosis International University, Dubai | 13/08/2024 | 005.8 SCH 2023 | SIU00338 | 13/08/2024 | 1 | 13/08/2024 | Book | |||||
Dewey Decimal Classification | Symbiosis International University, Dubai | Symbiosis International University, Dubai | 22/08/2024 | 005.8 SCH 2023 | SIU00339 | 22/08/2024 | 2 | 22/08/2024 | Book |