Secrets of a Cyber Security Architect (Record no. 232)

MARC details
000 -LEADER
fixed length control field 02054nam a22002537a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240822113749.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240813b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032475028
040 ## - CATALOGING SOURCE
Transcribing agency SIU
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 SCH 2023
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name SCHOENFIELD, BROOK S. E.
245 ## - TITLE STATEMENT
Title Secrets of a Cyber Security Architect
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. AUERBACH
Name of publisher, distributor, etc. AUERBACH PUBLICATIONS, [S.l.],
Date of publication, distribution, etc. 2023
300 ## - PHYSICAL DESCRIPTION
Extent 250 pages illustrations (black and white) ; 26 cm
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Introduction. What Is This Thing Called "Security Architecture"?. What Is Security Assessment. Architecture Risk Assessment. Threat Modeling. ATASM. Background knowledge: The Three S’s. Architecture. Threats. Attack Surfaces. Mitigations. Requirements. Security Architecture
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note What security architecture is and the areas of expertise a security architect needs in practice<br/><br/><br/>The relationship between attack methods and the art of building cyber defenses<br/><br/><br/>Why to use attacks and how to derive a set of mitigations and defenses<br/><br/><br/>Approaches, tricks, and manipulations proven successful for practicing security architecture<br/><br/><br/>Starting, maturing, and running effective security architecture programs<br/><br/><br/>Secrets of the trade for the practicing security architecture<br/><br/><br/>Tricks to surmount typical problems<br/><br/><br/>Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.
520 ## - SUMMARY, ETC.
Summary, etc. This book is filled with techniques, tips, and tricks that secure software architects and developers can apply directly. From assessing the sensitivity of data in a system through actually getting requirements implemented, this book offers readers practical, how-to advice in small, focused and directly applicable gems of insight, knowledge
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Security Architecture
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Security Assessment
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Hacking Prevention
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Symbiosis International University, Dubai Symbiosis International University, Dubai 13/08/2024   005.8 SCH 2023 SIU00338 13/08/2024 1 13/08/2024 Book
    Dewey Decimal Classification     Symbiosis International University, Dubai Symbiosis International University, Dubai 22/08/2024   005.8 SCH 2023 SIU00339 22/08/2024 2 22/08/2024 Book
All Rights Reserved to Symbiosis International University, Dubai

Powered by Koha