Secrets of a Cyber Security Architect
Material type:
- 9781032475028
- 005.8 SCH 2023
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Symbiosis International University, Dubai | 005.8 SCH 2023 (Browse shelf(Opens below)) | 1 | Available | SIU00338 | ||
![]() |
Symbiosis International University, Dubai | 005.8 SCH 2023 (Browse shelf(Opens below)) | 2 | Available | SIU00339 |
Browsing Symbiosis International University, Dubai shelves Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 GUP 2020 A beginner's guide to Internet of things security : attacks, applications, authentication, and fundamentals | 005.8 JRF 2023 Securing the Cloud : security strategies for the ubiquitous data center | 005.8 JRF 2023 Securing the Cloud : security strategies for the ubiquitous data center | 005.8 SCH 2023 Secrets of a Cyber Security Architect | 005.8 SCH 2023 Secrets of a Cyber Security Architect | 005.8 SKI 2021 Cybersecurity for everyone / | 005.8 SKI 2021 Cybersecurity for everyone / |
Introduction. What Is This Thing Called "Security Architecture"?. What Is Security Assessment. Architecture Risk Assessment. Threat Modeling. ATASM. Background knowledge: The Three S’s. Architecture. Threats. Attack Surfaces. Mitigations. Requirements. Security Architecture
What security architecture is and the areas of expertise a security architect needs in practice
The relationship between attack methods and the art of building cyber defenses
Why to use attacks and how to derive a set of mitigations and defenses
Approaches, tricks, and manipulations proven successful for practicing security architecture
Starting, maturing, and running effective security architecture programs
Secrets of the trade for the practicing security architecture
Tricks to surmount typical problems
Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.
This book is filled with techniques, tips, and tricks that secure software architects and developers can apply directly. From assessing the sensitivity of data in a system through actually getting requirements implemented, this book offers readers practical, how-to advice in small, focused and directly applicable gems of insight, knowledge
There are no comments on this title.