Engineering trustworthy systems get cybersecurity design right the first time

This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to thin...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Saydjari, O. Sami (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: New York, NY McGraw-Hill Education [2018]
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047559403
003 DE-627-1
005 20240228120502.0
007 cr uuu---uuuuu
008 191023s2018 xx |||||o 00| ||eng c
020 |a 9781260118186  |c electronic book  |9 978-1-260-11818-6 
020 |a 1260118185  |c electronic book  |9 1-260-11818-5 
035 |a (DE-627-1)047559403 
035 |a (DE-599)KEP047559403 
035 |a (ORHE)9781260118186 
035 |a (DE-627-1)047559403 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23 
100 1 |a Saydjari, O. Sami  |e VerfasserIn  |4 aut 
245 1 0 |a Engineering trustworthy systems  |b get cybersecurity design right the first time  |c O. Sami Saydjari 
264 1 |a New York, NY  |b McGraw-Hill Education  |c [2018] 
300 |a 1 online resource 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes index. - Description based on online resource; title from digital title page (viewed on March 30, 2021) 
520 |a This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices-- 
650 0 |a Computer networks  |x Security measures 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Computer networks ; Security measures 
776 1 |z 9781260118179 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781260118179 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781260118186/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047559403
_version_ 1818767317354414080
adam_text
any_adam_object
author Saydjari, O. Sami
author_facet Saydjari, O. Sami
author_role aut
author_sort Saydjari, O. Sami
author_variant o s s os oss
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047559403
(DE-599)KEP047559403
(ORHE)9781260118186
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02184cam a22004092 4500</leader><controlfield tag="001">ZDB-30-ORH-047559403</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120502.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781260118186</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-260-11818-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1260118185</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-260-11818-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047559403</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047559403</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781260118186</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047559403</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Saydjari, O. Sami</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Engineering trustworthy systems</subfield><subfield code="b">get cybersecurity design right the first time</subfield><subfield code="c">O. Sami Saydjari</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">McGraw-Hill Education</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Description based on online resource; title from digital title page (viewed on March 30, 2021)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781260118179</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781260118179</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781260118186/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047559403
illustrated Not Illustrated
indexdate 2024-12-18T08:47:58Z
institution BVB
isbn 9781260118186
1260118185
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource
psigel ZDB-30-ORH
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher McGraw-Hill Education
record_format marc
spelling Saydjari, O. Sami VerfasserIn aut
Engineering trustworthy systems get cybersecurity design right the first time O. Sami Saydjari
New York, NY McGraw-Hill Education [2018]
1 online resource
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes index. - Description based on online resource; title from digital title page (viewed on March 30, 2021)
This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices--
Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures
9781260118179
Erscheint auch als Druck-Ausgabe 9781260118179
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781260118186/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Saydjari, O. Sami
Engineering trustworthy systems get cybersecurity design right the first time
Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures
title Engineering trustworthy systems get cybersecurity design right the first time
title_auth Engineering trustworthy systems get cybersecurity design right the first time
title_exact_search Engineering trustworthy systems get cybersecurity design right the first time
title_full Engineering trustworthy systems get cybersecurity design right the first time O. Sami Saydjari
title_fullStr Engineering trustworthy systems get cybersecurity design right the first time O. Sami Saydjari
title_full_unstemmed Engineering trustworthy systems get cybersecurity design right the first time O. Sami Saydjari
title_short Engineering trustworthy systems
title_sort engineering trustworthy systems get cybersecurity design right the first time
title_sub get cybersecurity design right the first time
topic Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures
topic_facet Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures
url https://learning.oreilly.com/library/view/-/9781260118186/?ar
work_keys_str_mv AT saydjariosami engineeringtrustworthysystemsgetcybersecuritydesignrightthefirsttime