Practical Cybersecurity Architecture - Second Edition

Practical Cybersecurity Architecture - Second Edition

Diana Kelley / Ed Moyle

69,68 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2023
ISBN:
9781837637164
69,68 €
IVA incluido
Disponible

Selecciona una librería:

  • Donde los libros
  • Librería 7artes
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Plan, design, and build resilient security architectures to secure your organization’s hybrid networks, cloud-based workflows, services, and applications Key FeaturesUnderstand the role of the architect in successfully creating complex security structuresLearn methodologies for creating architecture documentation, engaging stakeholders, and implementing designsUnderstand how to refine and improve architecture methodologies to meet business challengesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionCybersecurity architecture is the discipline of systematically ensuring that an organization is resilient against cybersecurity threats. Cybersecurity architects work in tandem with stakeholders to create a vision for security in the organization and create designs that are implementable, goal-based, and aligned with the organization’s governance strategy.Within this book, you’ll learn the fundamentals of cybersecurity architecture as a practical discipline. These fundamentals are evergreen approaches that, once mastered, can be applied and adapted to new and emerging technologies like artificial intelligence and machine learning. You’ll learn how to address and mitigate risks, design secure solutions in a purposeful and repeatable way, communicate with others about security designs, and bring designs to fruition. This new edition outlines strategies to help you work with execution teams to make your vision a reality, along with ways of keeping designs relevant over time. As you progress, you’ll also learn about well-known frameworks for building robust designs and strategies that you can adopt to create your own designs.By the end of this book, you’ll have the foundational skills required to build infrastructure, cloud, AI, and application solutions for today and well into the future with robust security components for your organization.What you will learnCreate your own architectures and analyze different modelsUnderstand strategies for creating architectures for environments and applicationsDiscover approaches to documentation using repeatable approaches and toolsDiscover different communication techniques for designs, goals, and requirementsFocus on implementation strategies for designs that help reduce riskApply architectural discipline to your organization using best practicesWho this book is forThis book is for new as well as seasoned cybersecurity architects looking to explore and polish their cybersecurity architecture skills. Additionally, anyone involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization can benefit from this book. If you are a security practitioner, systems auditor, and (to a lesser extent) software developer invested in keeping your organization secure, this book will act as a reference guide. Table of ContentsWhat is Cybersecurity Architecture?Architecture - The Core of Solution BuildingBuilding an Architecture - Scope and RequirementsBuilding an Architecture - Your ToolboxBuilding an Architecture - Developing Enterprise BlueprintsBuilding an Architecture - Application BlueprintsExecution - Applying Architecture ModelsExecution - Future-ProofingPutting It All Together

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
    Disponible

    255,72 €

  • TLS Cryptography In-Depth
    Dr. Paul Duplys / Dr. Roland Schmitz
    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features:Learn about real-world cryptographic pitfalls and how to avoid themUnderstand past attacks on TLS, how these attacks worked, and how they were fixedDiscover the inner workings of modern cryptography and its application within TLSPurchase of the print ...
    Disponible

    60,18 €

  • Foundations of Cryptography
    Goldreich Oded / Oded Goldreich
    ...
    Disponible

    95,01 €

  • Quantum Information Theory
    Mark M. Wilde / Mark MWilde
    ...
    Disponible

    112,59 €

  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
    Disponible

    373,22 €

  • Privacy Risk Analysis
    Daniel Le Métayer / Sourya Joyee De
    Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal dat...

Otros libros del autor

  • Practical Cybersecurity Architecture
    Diana Kelley / Ed Moyle
    Plan and design robust security architectures to secure your organization’s technology landscape and the applications you developKey FeaturesLeverage practical use cases to successfully architect complex security structuresLearn risk assessment methodologies for the cloud, networks, and connected devicesUnderstand cybersecurity architecture to implement effective solutions in m...
    Disponible

    83,06 €