Condizione: New.
EUR 60,86
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New. xvi, 202 pages, illustrations.
Condizione: As New. Unread book in perfect condition.
EUR 57,41
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Condizione: New. xvi, 202 pages, illustrations.
EUR 66,59
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
EUR 63,40
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 63,41
Quantità: 1 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. New copy - Usually dispatched within 4 working days. 453.
EUR 69,86
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New. xvi, 202 pages, illustrations.
EUR 67,45
Quantità: 5 disponibili
Aggiungi al carrelloHardcover. Condizione: New.
EUR 70,37
Quantità: 9 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: New.
Condizione: New.
EUR 84,08
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 220 pages. 9.18x6.12x9.21 inches. In Stock.
EUR 83,31
Quantità: 1 disponibili
Aggiungi al carrelloHardback. Condizione: New. New copy - Usually dispatched within 4 working days. 185.
EUR 91,50
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New.
EUR 84,45
Quantità: 9 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Condizione: As New. Unread book in perfect condition.
Condizione: New.
EUR 94,75
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
EUR 103,53
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New.
EUR 126,29
Quantità: 2 disponibili
Aggiungi al carrelloHardcover. Condizione: Brand New. 202 pages. 9.50x6.25x0.75 inches. In Stock.
Editore: Taylor & Francis Ltd, London, 2024
ISBN 10: 0367700026 ISBN 13: 9780367700027
Lingua: Inglese
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms.Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system including people, processes, and technology using a single model.We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover."Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsofts Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems, from padlocks to phishing to enterprise software architecture. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
EUR 66,45
Quantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
EUR 75,94
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
EUR 79,15
Quantità: 5 disponibili
Aggiungi al carrelloHardback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Da: PBShop.store US, Wood Dale, IL, U.S.A.
HRD. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
EUR 98,23
Quantità: Più di 20 disponibili
Aggiungi al carrelloHRD. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Editore: Taylor & Francis Ltd, London, 2024
ISBN 10: 0367700026 ISBN 13: 9780367700027
Lingua: Inglese
Da: CitiRetail, Stevenage, Regno Unito
EUR 72,25
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms.Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system including people, processes, and technology using a single model.We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover."Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsofts Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems, from padlocks to phishing to enterprise software architecture. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.