EUR 60,29
Convertire valutaQuantità: 3 disponibili
Aggiungi al carrelloCondizione: New. xvi, 202 pages, illustrations.
EUR 64,01
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. New copy - Usually dispatched within 4 working days. 453.
EUR 58,30
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 67,22
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
EUR 69,67
Convertire valutaQuantità: 3 disponibili
Aggiungi al carrelloCondizione: New. xvi, 202 pages, illustrations.
EUR 63,99
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 74,60
Convertire valutaQuantità: 3 disponibili
Aggiungi al carrelloCondizione: New. xvi, 202 pages, illustrations.
EUR 66,61
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Editore: Taylor & Francis Ltd, London, 2024
ISBN 10: 0367700026 ISBN 13: 9780367700027
Lingua: Inglese
Da: AussieBookSeller, Truganina, VIC, Australia
EUR 55,28
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms.Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system including people, processes, and technology using a single model.We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover."Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsofts Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems, from padlocks to phishing to enterprise software architecture. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
EUR 84,09
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloHardback. Condizione: New. New copy - Usually dispatched within 4 working days. 185.
EUR 73,49
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 68,08
Convertire valutaQuantità: 5 disponibili
Aggiungi al carrelloHardcover. Condizione: New.
EUR 83,43
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 220 pages. 9.18x6.12x9.21 inches. In Stock.
EUR 90,65
Convertire valutaQuantità: 3 disponibili
Aggiungi al carrelloCondizione: New.
EUR 84,42
Convertire valutaQuantità: 9 disponibili
Aggiungi al carrelloCondizione: New.
EUR 95,00
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 95,64
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Editore: Taylor & Francis Ltd, London, 2024
ISBN 10: 0367700026 ISBN 13: 9780367700027
Lingua: Inglese
Da: CitiRetail, Stevenage, Regno Unito
EUR 71,74
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms.Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system including people, processes, and technology using a single model.We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover."Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsofts Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems, from padlocks to phishing to enterprise software architecture. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
EUR 102,40
Convertire valutaQuantità: 3 disponibili
Aggiungi al carrelloCondizione: New.
EUR 95,63
Convertire valutaQuantità: 9 disponibili
Aggiungi al carrelloCondizione: New.
EUR 104,18
Convertire valutaQuantità: 3 disponibili
Aggiungi al carrelloCondizione: New.
EUR 100,14
Convertire valutaQuantità: 9 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 106,11
Convertire valutaQuantità: 9 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Editore: Taylor & Francis Ltd (Sales) Sep 2021, 2021
ISBN 10: 0367700018 ISBN 13: 9780367700010
Lingua: Inglese
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 105,26
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Neuware - Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems, from padlocks to phishing to enterprise software architecture.
Editore: Taylor & Francis Ltd, London, 2024
ISBN 10: 0367700026 ISBN 13: 9780367700027
Lingua: Inglese
Da: Grand Eagle Retail, Mason, OH, U.S.A.
EUR 70,18
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms.Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system including people, processes, and technology using a single model.We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover."Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsofts Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems, from padlocks to phishing to enterprise software architecture. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
EUR 125,32
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloHardcover. Condizione: Brand New. 202 pages. 9.50x6.25x0.75 inches. In Stock.
EUR 84,22
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
EUR 68,22
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
EUR 76,65
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
EUR 79,90
Convertire valutaQuantità: 5 disponibili
Aggiungi al carrelloHardback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.