Security Architecture - How & Why

Security Architecture - How & Why

Tom Madsen

175,31 €
IVA incluido
Consulta disponibilidad
Editorial:
Taylor & Francis Ltd
Año de edición:
2022
Materia
Energía
ISBN:
9788770225847

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to many things and different areas, making a concrete definition of security architecture a difficult proposition. But having an architecture for the cyber security needs of an organization is important for many reasons, not least because having an architecture makes working with cyber security a much easier job, since we can now build on a, hopefully, solid foundation. Developing a security architecture is a daunting job for almost anyone, and in a company that has not had a cyber security program implemented before, the job becomes even harder. The benefits of having a concrete cyber security architecture in place cannot be overstated! The challenge here is that a security architecture is not something that can stand alone, it absolutely must be aligned with the business in which it is being implemented.This book emphasizes the importance, and the benefits, of having a security architecture in place. The book will be aligned with most of the sub-frameworks in the general framework called SABSA, or Sherwood Applied Business Security Architecture. SABSA is comprised of several individual frameworks and there are several certifications that you can take in SABSA. Aside from getting a validation of your skills, SABSA as a framework focuses on aligning the Security Architecture with the business and its strategy. Each of the chapters in this book will be aligned with one or more of the components in SABSA, the components will be described along with the introduction to each of the chapters.

Artículos relacionados

  • ENERGY CONUNDRUM, THE
    HIRST NEIL / NEIL A C HIRST / NEIL HIRST
    This book provides a comprehensive and balanced account of global energy policy; covering moral, political, social, technical and economic aspects of the subject. While The Energy Conundrum does not offer easy solutions, it provides the facts and evidence gathered from sources in government, industry, academia, and NGOs alike, for readers to understand the issues and make their...
  • Smart Grid as a Solution for Renewable and Efficient Energy
    As the need for proficient power resources continues to grow, it is becoming increasingly important to implement new strategies and technologies in energy distribution to meet consumption needs. The employment of smart grid networks assists in the efficient allocation of energy resources. Smart Grid as a Solution for Renewable and Efficient Energy features emergent research and...
  • The Subterranean Forest
    Rolf Peter Sieferle / Michael Osmann
    The Subterrranean Forest studies the historical transition from the agrarian solar energy regime to the use of fossil energy, which has fuelled the industrial transformation of the last 200 years. The author argues that the analysis of historical energy systems provides an explanation for the basic patterns of different social formations. It is the availability of free energy t...
    Disponible

    50,93 €

  • Nanotechnology Applications for Improvements in Energy Efficiency and Environmental Management
    MAShah / Paulo Davim
    As nanoscale research continues to advance, scientists and engineers are developing new applications for many different disciplines, including environmental remediation and energy optimization. Nanotechnology Applications for Improvements in Energy Efficiency and Environmental Management combines up-to-date research findings and relevant theoretical frameworks on the subject of...
  • Operational Research for Renewable Energy and Sustainable Environments
    The application of contemporary and emerging operational research optimization methods in renewable energy is vital to creating and maintaining sustainable environments across the planet. More research is needed to understand how modern and innovative technological solutions can enhance accessible global energy. Operational Research for Renewable Energy and Sustainable Environm...
  • Emerging Materials, Technologies, and Solutions for Energy Harvesting
    In an era dominated by electronic devices and interconnected technologies, the weak point of this technology remains the limited lifespan and lengthy maintenance of conventional batteries. The pervasive use of wireless sensor networks and Internet of Things (IoT) applications has accentuated the inadequacies of battery technology, which has not kept pace with the miniaturizatio...
    Disponible

    314,33 €

Otros libros del autor

  • Zero-trust - An Introduction
    Tom Madsen
    The book provides you with information on how to implement and manage a zero-trust architecture. ...
    Disponible

    84,34 €

  • The Art of War for Computer Security
    Tom Madsen
    In this book the author draws inspiration from Sun Tzu’s Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an orig...
    Disponible

    172,42 €

  • Relentless
    Tom Madsen
    In 2014, a terrible nightmare became real for Tom Madsen and his wife Marilene: a lump on their son Kevin’s leg was diagnosed as sarcoma. Kevin soldiers on through debilitating treatments for three years, but finally passes just shy of his 20th birthday. But Kevin refuses to go away, and he has shown up in numerous ways since he passed. In Relentless: From Both Sides of the Vei...
    Disponible

    19,18 €

  • The Art of War for Computer Security
    Tom Madsen
    In this book the author draws inspiration from Sun Tzu’s Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an orig...