Enterprise Level Security 1 & 2 - Kevin Foltz, William R. Simpson

Enterprise Level Security 1 & 2

Media-Kombination
766 Seiten
2020
CRC Press
978-0-367-53407-3 (ISBN)
145,60 inkl. MwSt
This set comprises of Enterprise Level Security and Enterprise Level Security 2. ELS provides a modern alternative to the fortress approach to security. ELS 2 follows on from the first book, which covered the basic concepts of ELS, to give a discussion of advanced topics and solutions.

Dr. Kevin E. Foltz, Institute for Defense Analyses, has over a decade of experience working to improve security in information systems. He has presented and published research on different aspects of enterprise security, security modeling, and high assurance systems. He also has degrees in Mathematics, Computer Science, Electrical Engineering, and Strategic Security Studies. Dr. William R. Simpson, Institute for Defense Analyses, has over two decades of experience working to improve systems security. He has degrees in Aeronautical Engineering and Business Administration, as well as undergoing military and government training. He spent many years as an expert in aeronautics before delving into the field of electronic and system testing, and he has spent the last 20 years on IT-related themes (mostly security, including processes, damage assessments of cyber intrusions, IT security standards, IT security evaluation, and IT architecture).

Enterprise Level Security (1): 1 Introduction SECTION I?BASICS AND PHILOSOPHY 2 Identity 3 Attributes 4 Access and Privilege 5 Cryptography 6 The Cloud 7 The Network SECTION II?TECHNICAL DETAILS 8 Claims-Based Authentication 9 Credentials for Access Claims 10 Claims Creation 11 Invoking an Application 12 Cascading Authorization 13 Federation 14 Content Access Control 15 Delegation 16 The Enterprise Attribute Ecosystem 17 Database Access 18 Building Enterprise Software 19 Vulnerability Analyses 20 An Enterprise Support Desk 21 Network Defense 22 Concluding Remarks Enterprise Level Security 2: Chapter 1. The First 16 Years. Chapter 2. A Brief Review of the Initial Book. Chapter 3. Minimal Requirements for the Advanced Topics. Chapter 4. Identity Claims in High Assurance. Chapter 5. Cloud Key Management. Chapter 6. Enhanced Assurance Needs. Chapter 7. Temporary Certificates. Chapter 8. Derived Certificates on Mobile Devices. Chapter 9. Veracity and Counter Claims. Chapter 10. Delegation of Access and Privilege. Chapter 11. Escalation of Privilege. Chapter 12. Federation. Chapter 13. Content Object Uniqueness for Forensics. Chapter 14. Homomorphic Encryption. Chapter 15. Access and Privilege in Big Data Analysis. Chapter 16. Data Mediation. Chapter 17. Mobile Ad Hoc. Chapter 18. Endpoint Device Management. Chapter 19. Endpoint Agent Architecture. Chapter 20. Ports and Protocols. Chapter 21. Asynchronous Messaging. Chapter 22. Virtual Application Data Center. Chapter 23. Managing System Changes. Chapter 24. Concluding Remarks.

Erscheint lt. Verlag 11.9.2020
Verlagsort London
Sprache englisch
Maße 156 x 234 mm
Gewicht 1090 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
Wirtschaft Betriebswirtschaft / Management Planung / Organisation
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
Wirtschaft Volkswirtschaftslehre
ISBN-10 0-367-53407-X / 036753407X
ISBN-13 978-0-367-53407-3 / 9780367534073
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
nach DSGVO und BDSG

von Andreas Schaupp

Druckwerk (2023)
Deutscher Apotheker Verlag
58,00
Datenschutz (Kombi-Ausgabe), Mitarbeiter-Merkblatt Datenschutz und …
Media-Kombination (2022)
Forum Verlag Herkert
304,95