Hands-on cybersecurity for architects: plan and design robust security architectures
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
Packt Publishing
2018
|
Ausgabe: | 1st ed |
Schlagwörter: | |
Links: | http://portal.igpublish.com/iglibrary/search/PACKT0004712.html http://portal.igpublish.com/iglibrary/search/PACKT0004712.html |
Abstract: | Solutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging security approaches. Hands-On Cybersecurity for Architects will help you to successfully design, integrate, and implement complex security structures in any solution whilst ensuring that the solution functions as expected. To start with, you will get to grips with the fundamentals of recent cybersecurity practices, followed by acquiring and understanding your organization's requirements. You will then move on to learning how to plan and design robust security architectures, along with practical approaches to performing various security assessments. Once you have grasped all this, you will learn to design and develop key requirements, such as firewalls, virtual private networks (VPNs), wide area networks (WANs), and digital certifications. In addition to this, you will discover how to integrate upcoming security changes on Bring your own device (BYOD), cloud platforms, and the Internet of Things (IoT), among others. Finally, you will explore how to design frequent updates and upgrades for your systems as per your enterprise's needs. By the end of this book, you will be able to architect solutions with robust security components for your infrastructure |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 336 p |
ISBN: | 1788830261 9781788627238 9781788830263 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV048810451 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 230210s2018 xx o|||| 00||| eng d | ||
020 | |a 1788830261 |9 1-78883-026-1 | ||
020 | |a 9781788627238 |9 978-1-78862-723-8 | ||
020 | |a 9781788830263 |9 978-1-78883-026-3 | ||
035 | |a (ZDB-221-PCL)045691983 | ||
035 | |a (OCoLC)1371318994 | ||
035 | |a (DE-599)KEP045691983 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-573 | ||
100 | 1 | |a Rerup, Neil |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hands-on cybersecurity for architects |b plan and design robust security architectures |c Neil Rerup, Milad Aslaner |
250 | |a 1st ed | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b Packt Publishing |c 2018 | |
300 | |a 336 p | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a Solutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging security approaches. Hands-On Cybersecurity for Architects will help you to successfully design, integrate, and implement complex security structures in any solution whilst ensuring that the solution functions as expected. To start with, you will get to grips with the fundamentals of recent cybersecurity practices, followed by acquiring and understanding your organization's requirements. You will then move on to learning how to plan and design robust security architectures, along with practical approaches to performing various security assessments. Once you have grasped all this, you will learn to design and develop key requirements, such as firewalls, virtual private networks (VPNs), wide area networks (WANs), and digital certifications. In addition to this, you will discover how to integrate upcoming security changes on Bring your own device (BYOD), cloud platforms, and the Internet of Things (IoT), among others. Finally, you will explore how to design frequent updates and upgrades for your systems as per your enterprise's needs. By the end of this book, you will be able to architect solutions with robust security components for your infrastructure | |
650 | 4 | |a Computer architecture | |
650 | 4 | |a Computer security | |
700 | 1 | |a Aslaner, Milad |e Verfasser |4 aut | |
856 | 4 | 0 | |u http://portal.igpublish.com/iglibrary/search/PACKT0004712.html |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-221-PCL | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034076390 | |
966 | e | |u http://portal.igpublish.com/iglibrary/search/PACKT0004712.html |l DE-573 |p ZDB-221-PCL |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818990323625361408 |
---|---|
any_adam_object | |
author | Rerup, Neil Aslaner, Milad |
author_facet | Rerup, Neil Aslaner, Milad |
author_role | aut aut |
author_sort | Rerup, Neil |
author_variant | n r nr m a ma |
building | Verbundindex |
bvnumber | BV048810451 |
collection | ZDB-221-PCL |
ctrlnum | (ZDB-221-PCL)045691983 (OCoLC)1371318994 (DE-599)KEP045691983 |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02779nam a22003971c 4500</leader><controlfield tag="001">BV048810451</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230210s2018 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788830261</subfield><subfield code="9">1-78883-026-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788627238</subfield><subfield code="9">978-1-78862-723-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788830263</subfield><subfield code="9">978-1-78883-026-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-221-PCL)045691983</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1371318994</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP045691983</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rerup, Neil</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hands-on cybersecurity for architects</subfield><subfield code="b">plan and design robust security architectures</subfield><subfield code="c">Neil Rerup, Milad Aslaner</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">336 p</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Solutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging security approaches. Hands-On Cybersecurity for Architects will help you to successfully design, integrate, and implement complex security structures in any solution whilst ensuring that the solution functions as expected. To start with, you will get to grips with the fundamentals of recent cybersecurity practices, followed by acquiring and understanding your organization's requirements. You will then move on to learning how to plan and design robust security architectures, along with practical approaches to performing various security assessments. Once you have grasped all this, you will learn to design and develop key requirements, such as firewalls, virtual private networks (VPNs), wide area networks (WANs), and digital certifications. In addition to this, you will discover how to integrate upcoming security changes on Bring your own device (BYOD), cloud platforms, and the Internet of Things (IoT), among others. Finally, you will explore how to design frequent updates and upgrades for your systems as per your enterprise's needs. By the end of this book, you will be able to architect solutions with robust security components for your infrastructure</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aslaner, Milad</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://portal.igpublish.com/iglibrary/search/PACKT0004712.html</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PCL</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034076390</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://portal.igpublish.com/iglibrary/search/PACKT0004712.html</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048810451 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T19:52:33Z |
institution | BVB |
isbn | 1788830261 9781788627238 9781788830263 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034076390 |
oclc_num | 1371318994 |
open_access_boolean | |
owner | DE-573 |
owner_facet | DE-573 |
physical | 336 p |
psigel | ZDB-221-PCL |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt Publishing |
record_format | marc |
spelling | Rerup, Neil Verfasser aut Hands-on cybersecurity for architects plan and design robust security architectures Neil Rerup, Milad Aslaner 1st ed [Erscheinungsort nicht ermittelbar] Packt Publishing 2018 336 p txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Solutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging security approaches. Hands-On Cybersecurity for Architects will help you to successfully design, integrate, and implement complex security structures in any solution whilst ensuring that the solution functions as expected. To start with, you will get to grips with the fundamentals of recent cybersecurity practices, followed by acquiring and understanding your organization's requirements. You will then move on to learning how to plan and design robust security architectures, along with practical approaches to performing various security assessments. Once you have grasped all this, you will learn to design and develop key requirements, such as firewalls, virtual private networks (VPNs), wide area networks (WANs), and digital certifications. In addition to this, you will discover how to integrate upcoming security changes on Bring your own device (BYOD), cloud platforms, and the Internet of Things (IoT), among others. Finally, you will explore how to design frequent updates and upgrades for your systems as per your enterprise's needs. By the end of this book, you will be able to architect solutions with robust security components for your infrastructure Computer architecture Computer security Aslaner, Milad Verfasser aut http://portal.igpublish.com/iglibrary/search/PACKT0004712.html Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Rerup, Neil Aslaner, Milad Hands-on cybersecurity for architects plan and design robust security architectures Computer architecture Computer security |
title | Hands-on cybersecurity for architects plan and design robust security architectures |
title_auth | Hands-on cybersecurity for architects plan and design robust security architectures |
title_exact_search | Hands-on cybersecurity for architects plan and design robust security architectures |
title_full | Hands-on cybersecurity for architects plan and design robust security architectures Neil Rerup, Milad Aslaner |
title_fullStr | Hands-on cybersecurity for architects plan and design robust security architectures Neil Rerup, Milad Aslaner |
title_full_unstemmed | Hands-on cybersecurity for architects plan and design robust security architectures Neil Rerup, Milad Aslaner |
title_short | Hands-on cybersecurity for architects |
title_sort | hands on cybersecurity for architects plan and design robust security architectures |
title_sub | plan and design robust security architectures |
topic | Computer architecture Computer security |
topic_facet | Computer architecture Computer security |
url | http://portal.igpublish.com/iglibrary/search/PACKT0004712.html |
work_keys_str_mv | AT rerupneil handsoncybersecurityforarchitectsplananddesignrobustsecurityarchitectures AT aslanermilad handsoncybersecurityforarchitectsplananddesignrobustsecurityarchitectures |