Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Specificaties
Paperback, blz. | Engels
McGraw-Hill Education | e druk, 2018
ISBN13: 9781260118179
Rubricering
McGraw-Hill Education e druk, 2018 9781260118179
€ 83,45
Levertijd ongeveer 10 werkdagen

Samenvatting

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality,  authenticity, or access to any online entitlements included with the product.

Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks

This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.

Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including: 

• Defining the fundamental nature and full breadth of the cybersecurity problem
• Adopting an essential perspective that considers attacks, failures, and attacker mindsets 
• Developing and implementing risk-mitigating, systems-based solutions
• Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space 

Specificaties

ISBN13:9781260118179
Taal:Engels
Bindwijze:paperback

Inhoudsopgave

<B>PART 1:</B> What Do You Want?<BR><B>Chapter 1:</B> What's the Problem?<BR><B>Chapter 2:</B> Cybersecurity Right-Think<BR><B>Chapter 3:</B> Value and Mission: Know Thyself<BR><B>Chapter 4:</B> Harm: Mission in Peril<BR><B>Chapter 5:</B> Approximating Reality<BR><BR><B>PART 2:</B> What Could Go Wrong?<BR><B>Chapter 6:</B> Adversaries: Know Thy Enemy<BR><B>Chapter 7:</B> Forests of Attack Trees<BR><BR><B>PART 3:</B> What Are the Building Blocks of Mitigating Risk?<BR><B>Chapter 8:</B> Countermeasures -- Security Controls<BR><B>Chapter 9:</B> Trustworthy Hardware -- Bedrock<BR><B>Chapter 10:</B> Cryptography -- A Sharp Tool<BR><B>Chapter 11:</B> Authentication<BR><B>Chapter 12:</B> Authorization<BR><B>Chapter 13:</B> Detection Foundation<BR><B>Chapter 14:</B> Detection Systems<BR><B>Chapter 15:</B> Detection Strategy<BR><B>Chapter 16:</B> Deterrence and Adversarial Risk<BR><BR><B>PART 4:</B> How Do You Orchestrate Cybersecurity?<BR>17:</B> Cybersecurity Risk Assessment<BR><B>Chapter 18:</B> Risk Mitigation and Optimization<BR><B>Chapter 19:</B> Engineering Fundamentals<BR><B>Chapter 20:</B> Architecting Cybersecurity<BR><B>Chapter 21:</B> Assuring Cybersecurity: Getting it Right<BR><B>Chapter 22:</B> Cyber Situation Understanding: What's Going On<BR><B>Chapter 23:</B> Command and Control: What to Do About Attack<BR><BR><B>PART 5:</B> Moving Cybersecurity Forward<BR><B>Chapter 24:</B> Strategy Policy and Investment<BR><B>Chapter 25:</B> The Future of Cybersecurity<BR><BR><B>PART 6:</B> Appendices<BR><B>App A:</B> Resources
€ 83,45
Levertijd ongeveer 10 werkdagen

Rubrieken

    Personen

      Trefwoorden

        Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time