Enterprise Cybersecurity / Libristo.pl
Enterprise Cybersecurity

Kod: 01420194

Enterprise Cybersecurity

Autor Scott Donaldson, Stanley Siegel, Chris Williams, Abdul Aslam

Enterprise Cybersecurity lays out the design, implementation,and management of comprehensive cybersecurity programs that enable enterprises of all sizes and sectors to protect themselves preemptively and actively against the escal ... więcej

405.66

Zwykle: 426.95 zł

Oszczędzasz 21.29 zł


Dostępna u dostawcy
Wysyłamy za 14 - 18 dni
Dodaj do schowka

Zobacz książki o podobnej tematyce

Bon podarunkowy: Radość gwarantowana

Wzór bonu podarunkowegoDowiedz się więcej

Więcej informacji o Enterprise Cybersecurity

Za ten zakup dostaniesz 236 punkty

Opis

Enterprise Cybersecurity lays out the design, implementation,and management of comprehensive cybersecurity programs that enable enterprises of all sizes and sectors to protect themselves preemptively and actively against the escalating threat of modern, targeted cyberattacks. §To frame their exposition of the components of effective cybersecurity programs, the authors develop two actionable concepts central to their systems engineering approach. First, the "kill chain" of a cyber-intrusion comprises the intrusive phases of adversarial reconnaissance, weaponization, delivery, and exploitation, to each of which the authors map defensive courses of action for detection, mitigation, and response. Second, the "trust stack" concept articulates the structure of defensive response in terms of two subsidiary stacks whose elements are sequentially arranged in increasing difficulty for an attacker to breach and compromise. One subsidiary stack is the "application stack" comprised of ten elements such as end user, application software, and database. The other is the "administration stack" comprised of nine elements such as user credentials, application administration, and database administration. §Within the conceptual framework of the kill chain and trust stack, Enterprise Cybersecurity describes the aims, strategies, tactics, and taxonomy of security threats and the panoply of corresponding cyberdefensive measures.These countermeasures include hardening of enterprise defenses, immediate detection of intrusions, containment of attacks, and repulse to prevent exploitation of breaches. End-to-end cyberdefense systems integrate preventive,detective, monitoring, and forensics controls.§Toward this integrative end, the team of authors--respected experts and thought leaders in the rapidly evolving field of enterprise cybersecurity--introduce a new synthetic paradigm called Cybersecurity Capability Architecture, which they have collectively refined and separately put into practice. §Readers of this book will learn to design and implement the ten functional areas of Cybersecurity Capability Architecture:§systems administration §network security §application security §endpoint, server, and device security §asset management §authentication and identity management §cryptography and data protection §monitoring, vulnerability, and patch management §incident response §policy, audit, e-discovery, and training

Szczegóły książki

Kategoria Książki po angielsku Computing & information technology Computer security

405.66

Ulubione w innej kategorii


250 000
zadowolonych klientów

Od roku 2008 obsłużyliśmy wielu miłośników książek, ale dla nas każdy był tym wyjątkowym.


Paczkomat 12,99 ZŁ 31975 punktów

Copyright! ©2008-24 libristo.pl Wszelkie prawa zastrzeżonePrywatnieCookies


Konto: Logowanie
Wszystkie książki świata w jednym miejscu. I co więcej w super cenach.

Koszyk ( pusty )

Kup za 299 zł i
zyskaj darmową dostawę.

Twoja lokalizacja: