Use coupon code “MARCH20” for a 20% discount on all items! Valid until 31-03-2025

Site Logo
Search Suggestions

      Royal Mail  express delivery to UK destinations

      Regular sales and promotions

      Stock updates every 20 minutes!

      Securing Systems: Applied Security Architecture and Threat Models

      Out of stock

      Firm sale: non returnable item
      SKU 9781032027401 Categories ,

      Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This...

      £46.99

      Buy new:

      Delivery: UK delivery Only. Usually dispatched in 1-2 working days.

      Shipping costs: All shipping costs calculated in the cart or during the checkout process.

      Standard service (normally 2-3 working days): 48hr Tracked service.

      Premium service (next working day): 24hr Tracked service – signature service included.

      Royal mail: 24 & 48hr Tracked: Trackable items weighing up to 20kg are tracked to door and are inclusive of text and email with ‘Leave in Safe Place’ options, but are non-signature services. Examples of service expected: Standard 48hr service – if ordered before 3pm on Thursday then expected delivery would be on Saturday. If Premium 24hr service used, then expected delivery would be Friday.

      Signature Service: This service is only available for tracked items.

      Leave in Safe Place: This option is available at no additional charge for tracked services.

      Description

      Product ID:9781032027401
      Product Form:Paperback / softback
      Country of Manufacture:GB
      Title:Securing Systems
      Subtitle:Applied Security Architecture and Threat Models
      Authors:Author: Brook S. E. Schoenfield
      Page Count:440
      Subjects:Engineering: general, Engineering: general, Environmental science, engineering and technology, Digital and information technologies: Legal aspects, Software Engineering, Computer security, Network management, Computer science, Environmental science, engineering & technology, Legal aspects of IT, Software Engineering, Computer security, Network management, Computer science
      Description:

      Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system’s existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.


      Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system’s existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.

      Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis:

      • When should the security architect begin the analysis?
      • At what points can a security architect add the most value?
      • What are the activities the architect must execute?
      • How are these activities delivered?
      • What is the set of knowledge domains applied to the analysis?
      • What are the outputs?
      • What are the tips and tricks that make security architecture risk assessment easier?

      To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you’ve seen a sufficient diversity of architectures, you’ll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.


      Imprint Name:CRC Press
      Publisher Name:Taylor & Francis Ltd
      Country of Publication:GB
      Publishing Date:2021-06-30

      Additional information

      Weight814 g
      Dimensions252 × 179 × 33 mm