Enterprise Level Security 1 & 2
Autor Kevin Foltz, William R. Simpsonen Limba Engleză Hardback – 11 sep 2020
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 302.51 lei 6-8 săpt. | |
CRC Press – 20 dec 2022 | 302.51 lei 6-8 săpt. | |
Hardback (1) | 607.72 lei 6-8 săpt. | |
CRC Press – 11 sep 2020 | 607.72 lei 6-8 săpt. |
Preț: 607.72 lei
Preț vechi: 808.04 lei
-25% Nou
Puncte Express: 912
Preț estimativ în valută:
116.31€ • 120.81$ • 96.61£
116.31€ • 120.81$ • 96.61£
Carte tipărită la comandă
Livrare economică 01-15 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780367534073
ISBN-10: 036753407X
Pagini: 766
Dimensiuni: 156 x 234 mm
Greutate: 1.09 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
ISBN-10: 036753407X
Pagini: 766
Dimensiuni: 156 x 234 mm
Greutate: 1.09 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Public țintă
Postgraduate and ProfessionalNotă biografică
Dr. Kevin E. Foltz, Institute for Defense Analyses, has over a decade of experience working to improve security in information systems. He has presented and published research on different aspects of enterprise security, security modeling, and high assurance systems. He also has degrees in Mathematics, Computer Science, Electrical Engineering, and Strategic Security Studies.
Dr. William R. Simpson, Institute for Defense Analyses, has over two decades of experience working to improve systems security. He has degrees in Aeronautical Engineering and Business Administration, as well as undergoing military and government training. He spent many years as an expert in aeronautics before delving into the field of electronic and system testing, and he has spent the last 20 years on IT-related themes (mostly security, including processes, damage assessments of cyber intrusions, IT security standards, IT security evaluation, and IT architecture).
Dr. William R. Simpson, Institute for Defense Analyses, has over two decades of experience working to improve systems security. He has degrees in Aeronautical Engineering and Business Administration, as well as undergoing military and government training. He spent many years as an expert in aeronautics before delving into the field of electronic and system testing, and he has spent the last 20 years on IT-related themes (mostly security, including processes, damage assessments of cyber intrusions, IT security standards, IT security evaluation, and IT architecture).
Cuprins
Enterprise Level Security (1): 1 Introduction SECTION I?BASICS AND PHILOSOPHY 2 Identity 3 Attributes 4 Access and Privilege 5 Cryptography 6 The Cloud 7 The Network SECTION II?TECHNICAL DETAILS 8 Claims-Based Authentication 9 Credentials for Access Claims 10 Claims Creation 11 Invoking an Application 12 Cascading Authorization 13 Federation 14 Content Access Control 15 Delegation 16 The Enterprise Attribute Ecosystem 17 Database Access 18 Building Enterprise Software 19 Vulnerability Analyses 20 An Enterprise Support Desk 21 Network Defense 22 Concluding Remarks Enterprise Level Security 2: Chapter 1. The First 16 Years. Chapter 2. A Brief Review of the Initial Book. Chapter 3. Minimal Requirements for the Advanced Topics. Chapter 4. Identity Claims in High Assurance. Chapter 5. Cloud Key Management. Chapter 6. Enhanced Assurance Needs. Chapter 7. Temporary Certificates. Chapter 8. Derived Certificates on Mobile Devices. Chapter 9. Veracity and Counter Claims. Chapter 10. Delegation of Access and Privilege. Chapter 11. Escalation of Privilege. Chapter 12. Federation. Chapter 13. Content Object Uniqueness for Forensics. Chapter 14. Homomorphic Encryption. Chapter 15. Access and Privilege in Big Data Analysis. Chapter 16. Data Mediation. Chapter 17. Mobile Ad Hoc. Chapter 18. Endpoint Device Management. Chapter 19. Endpoint Agent Architecture. Chapter 20. Ports and Protocols. Chapter 21. Asynchronous Messaging. Chapter 22. Virtual Application Data Center. Chapter 23. Managing System Changes. Chapter 24. Concluding Remarks.
Descriere
This set comprises of Enterprise Level Security and Enterprise Level Security 2. ELS provides a modern alternative to the fortress approach to security. ELS 2 follows on from the first book, which covered the basic concepts of ELS, to give a discussion of advanced topics and solutions.