Practical Cybersecurity Architecture
            
暫譯: 實用的網路安全架構
        
        Moyle, Ed, Kelley, Diana
- 出版商: Packt Publishing
- 出版日期: 2020-11-20
- 售價: $2,090
- 貴賓價: 9.5 折 $1,986
- 語言: 英文
- 頁數: 418
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1838989927
- ISBN-13: 9781838989927
- 
    相關分類:
    
      資訊安全
 
- 
    其他版本:
    
      Practical Cybersecurity Architecture - Second Edition: A guide to creating and implementing robust designs for cybersecurity architects
 
買這商品的人也買了...
- 
                
                   Node.js 模組參考手冊 Node.js 模組參考手冊$580$458
- 
                
                   Java 8入門進階【適用JDK 8.0版】 Java 8入門進階【適用JDK 8.0版】$650$514
- 
                
                   $594Linux 防火牆, 4/e (Linux Firewalls: Enhancing Security with nftables and Beyond, 4/e) $594Linux 防火牆, 4/e (Linux Firewalls: Enhancing Security with nftables and Beyond, 4/e)
- 
                
                   Microsoft SQL Server 2016 管理實戰 Microsoft SQL Server 2016 管理實戰$699$552
- 
                
                   寫給未來社會的新帳本──區塊鏈:人類的新型貨幣、終極信任機器與分散治理革命 (Decoding Global Blockchain and Investment Cases) 寫給未來社會的新帳本──區塊鏈:人類的新型貨幣、終極信任機器與分散治理革命 (Decoding Global Blockchain and Investment Cases)$380$323
- 
                
                   iOS 11 程式設計實戰 -- Swift 4 快速上手的開發技巧200+ iOS 11 程式設計實戰 -- Swift 4 快速上手的開發技巧200+$580$458
- 
                
                   鳥哥的 Linux 基礎學習訓練教材 鳥哥的 Linux 基礎學習訓練教材$480$408
- 
                
                   Java 入門 邁向高手之路 王者歸來 Java 入門 邁向高手之路 王者歸來$699$594
- 
                
                   Introduction to Ada Programming, 2nd Edition Introduction to Ada Programming, 2nd Edition$940$893
- 
                
                   Kali Linux 滲透測試工具|花小錢做資安,你也是防駭高手, 3/e Kali Linux 滲透測試工具|花小錢做資安,你也是防駭高手, 3/e$880$748
- 
                
                   $2,070Linux Bible, 10/e (Paperback) $2,070Linux Bible, 10/e (Paperback)
- 
                
                   $1,320Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide: Begin a successful career in networking with 200-301 CCNA certification (Paperback) $1,320Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide: Begin a successful career in networking with 200-301 CCNA certification (Paperback)
- 
                
                   Wireshark 實戰演練與網路封包分析寶典 Wireshark 實戰演練與網路封包分析寶典$680$530
- 
                
                   CISSP All-In-One Exam Guide, 9/e (Hardcover) CISSP All-In-One Exam Guide, 9/e (Hardcover)$2,451$2,322
- 
                
                   Spring REST API 開發與測試指南|使用 Swagger、HATEOAS、JUnit、Mockito、PowerMock、Spring Test Spring REST API 開發與測試指南|使用 Swagger、HATEOAS、JUnit、Mockito、PowerMock、Spring Test$580$493
- 
                
                   極深入卻極清楚:電腦網路原理從 OSI 實體層到應用層 極深入卻極清楚:電腦網路原理從 OSI 實體層到應用層$880$695
- 
                
                   系統程式設計 (下册) 系統程式設計 (下册)$880$660
- 
                
                   職安一點通|職業安全管理甲級檢定完勝攻略|2022版 職安一點通|職業安全管理甲級檢定完勝攻略|2022版$700$553
- 
                
                   Java SE 17 技術手冊 Java SE 17 技術手冊$680$537
- 
                
                   Certiport ITS Network Security 網路安全管理核心能力國際認證應考攻略 Certiport ITS Network Security 網路安全管理核心能力國際認證應考攻略$250$198
- 
                
                   CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide (Hardcover) CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide (Hardcover)$2,600$2,548
- 
                
                   Linux 指令大全:工程師活用命令列技巧的常備工具書 (全新升級版) (The Linux Command Line : A Complete Introduction, 2/e) Linux 指令大全:工程師活用命令列技巧的常備工具書 (全新升級版) (The Linux Command Line : A Complete Introduction, 2/e)$780$663
- 
                
                   電腦網路原理, 6/e (含ITS Networking 網路管理與應用國際認證模擬試題) 電腦網路原理, 6/e (含ITS Networking 網路管理與應用國際認證模擬試題)$360$284
- 
                
                   Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks (Paperback) Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks (Paperback)$1,850$1,758
- 
                
                   Red Hat Rhcsa 9 Cert Guide: Ex200 (Paperback) Red Hat Rhcsa 9 Cert Guide: Ex200 (Paperback)$1,980$1,940
商品描述
Plan and design robust security architectures to secure your organization's technology landscape and the applications you develop
Key Features
- Leverage practical use cases to successfully architect complex security structures
- Learn risk assessment methodologies for the cloud, networks, and connected devices
- Understand cybersecurity architecture to implement effective solutions in medium-to-large enterprises
Book Description
Cybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization.
With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs.
By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.
What you will learn
- Explore ways to create your own architectures and analyze those from others
- Understand strategies for creating architectures for environments and applications
- Discover approaches to documentation using repeatable approaches and tools
- Delve into communication techniques for designs, goals, and requirements
- Focus on implementation strategies for designs that help reduce risk
- Become well-versed with methods to apply architectural discipline to your organization
Who this book is for
If you are involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization, then this security book is for you. This includes security practitioners, technology governance practitioners, systems auditors, and software developers invested in keeping their organizations secure. If you're new to cybersecurity architecture, the book takes you through the process step by step; for those who already work in the field and have some experience, the book presents strategies and techniques that will help them develop their skills further.
商品描述(中文翻譯)
**計劃和設計穩健的安全架構,以保護您組織的技術環境和您開發的應用程式**
#### 主要特點
- 利用實際案例成功架構複雜的安全結構
- 學習雲端、網路和連接設備的風險評估方法
- 理解網路安全架構,以在中大型企業中實施有效的解決方案
#### 書籍描述
網路安全架構師與他人合作,以全面了解業務需求。他們與利益相關者合作,計劃可實施的設計,並以目標為基礎,符合組織的治理策略。
在這本書中,您將探索網路安全架構的基本原則:應對和減輕風險、設計安全解決方案,以及與他人溝通安全設計。這本書概述了幫助您與執行團隊合作,將您的願景變為具體現實的策略,並涵蓋了通過持續監控、維護和持續改進來保持設計相關性的方法。隨著進展,您還將學習建立穩健設計的公認框架,以及您可以採用的策略來創建自己的設計。
在本書結束時,您將具備為您的組織架構具有穩健安全組件的解決方案所需的技能,無論是基礎設施解決方案、應用程式解決方案或其他。
#### 您將學到什麼
- 探索創建自己的架構和分析他人架構的方法
- 理解為環境和應用程式創建架構的策略
- 發現使用可重複的方法和工具進行文檔記錄的途徑
- 深入了解設計、目標和需求的溝通技巧
- 專注於幫助減少風險的設計實施策略
- 熟悉將架構紀律應用於您組織的方法
#### 本書適合誰
如果您參與組織中網路安全的實施、規劃、運營或維護過程,那麼這本安全書籍適合您。這包括安全從業人員、技術治理從業人員、系統審計員和致力於保護其組織安全的軟體開發人員。如果您是網路安全架構的新手,本書將逐步引導您完成過程;對於那些已經在該領域工作並有一定經驗的人,本書提供的策略和技術將幫助他們進一步發展技能。
目錄大綱
Table of Contents
- What is Cybersecurity Architecture?
- The Core of Solution Building
- Building an Architecture – Scope and Requirements
- Building an Architecture – Your Toolbox
- Building an Architecture – Developing Enterprise Blueprints
- Building an Architecture – Application Blueprints
- Execution – Applying Architecture Models
- Execution – Future- Proofing
- Putting It All Together
目錄大綱(中文翻譯)
Table of Contents
- What is Cybersecurity Architecture?
- The Core of Solution Building
- Building an Architecture – Scope and Requirements
- Building an Architecture – Your Toolbox
- Building an Architecture – Developing Enterprise Blueprints
- Building an Architecture – Application Blueprints
- Execution – Applying Architecture Models
- Execution – Future- Proofing
- Putting It All Together
 
 
     
     
     
    
 
     
     
     
     
    