Engineering trustworthy systems get cybersecurity design right the first time
This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to thin...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
McGraw-Hill Education
[2018]
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047559403 | ||
003 | DE-627-1 | ||
005 | 20240228120502.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781260118186 |c electronic book |9 978-1-260-11818-6 | ||
020 | |a 1260118185 |c electronic book |9 1-260-11818-5 | ||
035 | |a (DE-627-1)047559403 | ||
035 | |a (DE-599)KEP047559403 | ||
035 | |a (ORHE)9781260118186 | ||
035 | |a (DE-627-1)047559403 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Saydjari, O. Sami |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Engineering trustworthy systems |b get cybersecurity design right the first time |c O. Sami Saydjari |
264 | 1 | |a New York, NY |b McGraw-Hill Education |c [2018] | |
300 | |a 1 online resource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Description based on online resource; title from digital title page (viewed on March 30, 2021) | ||
520 | |a This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices-- | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
776 | 1 | |z 9781260118179 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781260118179 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781260118186/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047559403 |
---|---|
_version_ | 1818767317354414080 |
adam_text | |
any_adam_object | |
author | Saydjari, O. Sami |
author_facet | Saydjari, O. Sami |
author_role | aut |
author_sort | Saydjari, O. Sami |
author_variant | o s s os oss |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047559403 (DE-599)KEP047559403 (ORHE)9781260118186 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02184cam a22004092 4500</leader><controlfield tag="001">ZDB-30-ORH-047559403</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120502.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781260118186</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-260-11818-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1260118185</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-260-11818-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047559403</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047559403</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781260118186</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047559403</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Saydjari, O. Sami</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Engineering trustworthy systems</subfield><subfield code="b">get cybersecurity design right the first time</subfield><subfield code="c">O. Sami Saydjari</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">McGraw-Hill Education</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Description based on online resource; title from digital title page (viewed on March 30, 2021)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781260118179</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781260118179</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781260118186/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047559403 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:47:58Z |
institution | BVB |
isbn | 9781260118186 1260118185 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource |
psigel | ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | McGraw-Hill Education |
record_format | marc |
spelling | Saydjari, O. Sami VerfasserIn aut Engineering trustworthy systems get cybersecurity design right the first time O. Sami Saydjari New York, NY McGraw-Hill Education [2018] 1 online resource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Description based on online resource; title from digital title page (viewed on March 30, 2021) This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices-- Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures 9781260118179 Erscheint auch als Druck-Ausgabe 9781260118179 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781260118186/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Saydjari, O. Sami Engineering trustworthy systems get cybersecurity design right the first time Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
title | Engineering trustworthy systems get cybersecurity design right the first time |
title_auth | Engineering trustworthy systems get cybersecurity design right the first time |
title_exact_search | Engineering trustworthy systems get cybersecurity design right the first time |
title_full | Engineering trustworthy systems get cybersecurity design right the first time O. Sami Saydjari |
title_fullStr | Engineering trustworthy systems get cybersecurity design right the first time O. Sami Saydjari |
title_full_unstemmed | Engineering trustworthy systems get cybersecurity design right the first time O. Sami Saydjari |
title_short | Engineering trustworthy systems |
title_sort | engineering trustworthy systems get cybersecurity design right the first time |
title_sub | get cybersecurity design right the first time |
topic | Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
topic_facet | Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781260118186/?ar |
work_keys_str_mv | AT saydjariosami engineeringtrustworthysystemsgetcybersecuritydesignrightthefirsttime |