Enterprise Level Security 1 & 2
CRC Press
978-0-367-53407-3 (ISBN)
- Titel z.Zt. nicht lieferbar
- Versandkostenfrei innerhalb Deutschlands
- Auch auf Rechnung
- Verfügbarkeit in der Filiale vor Ort prüfen
- Artikel merken
Dr. Kevin E. Foltz, Institute for Defense Analyses, has over a decade of experience working to improve security in information systems. He has presented and published research on different aspects of enterprise security, security modeling, and high assurance systems. He also has degrees in Mathematics, Computer Science, Electrical Engineering, and Strategic Security Studies. Dr. William R. Simpson, Institute for Defense Analyses, has over two decades of experience working to improve systems security. He has degrees in Aeronautical Engineering and Business Administration, as well as undergoing military and government training. He spent many years as an expert in aeronautics before delving into the field of electronic and system testing, and he has spent the last 20 years on IT-related themes (mostly security, including processes, damage assessments of cyber intrusions, IT security standards, IT security evaluation, and IT architecture).
Enterprise Level Security (1): 1 Introduction SECTION I?BASICS AND PHILOSOPHY 2 Identity 3 Attributes 4 Access and Privilege 5 Cryptography 6 The Cloud 7 The Network SECTION II?TECHNICAL DETAILS 8 Claims-Based Authentication 9 Credentials for Access Claims 10 Claims Creation 11 Invoking an Application 12 Cascading Authorization 13 Federation 14 Content Access Control 15 Delegation 16 The Enterprise Attribute Ecosystem 17 Database Access 18 Building Enterprise Software 19 Vulnerability Analyses 20 An Enterprise Support Desk 21 Network Defense 22 Concluding Remarks Enterprise Level Security 2: Chapter 1. The First 16 Years. Chapter 2. A Brief Review of the Initial Book. Chapter 3. Minimal Requirements for the Advanced Topics. Chapter 4. Identity Claims in High Assurance. Chapter 5. Cloud Key Management. Chapter 6. Enhanced Assurance Needs. Chapter 7. Temporary Certificates. Chapter 8. Derived Certificates on Mobile Devices. Chapter 9. Veracity and Counter Claims. Chapter 10. Delegation of Access and Privilege. Chapter 11. Escalation of Privilege. Chapter 12. Federation. Chapter 13. Content Object Uniqueness for Forensics. Chapter 14. Homomorphic Encryption. Chapter 15. Access and Privilege in Big Data Analysis. Chapter 16. Data Mediation. Chapter 17. Mobile Ad Hoc. Chapter 18. Endpoint Device Management. Chapter 19. Endpoint Agent Architecture. Chapter 20. Ports and Protocols. Chapter 21. Asynchronous Messaging. Chapter 22. Virtual Application Data Center. Chapter 23. Managing System Changes. Chapter 24. Concluding Remarks.
Erscheint lt. Verlag | 11.9.2020 |
---|---|
Verlagsort | London |
Sprache | englisch |
Maße | 156 x 234 mm |
Gewicht | 1090 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Theorie / Studium | |
Recht / Steuern ► Privatrecht / Bürgerliches Recht ► IT-Recht | |
Wirtschaft ► Betriebswirtschaft / Management ► Planung / Organisation | |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
Wirtschaft ► Volkswirtschaftslehre | |
ISBN-10 | 0-367-53407-X / 036753407X |
ISBN-13 | 978-0-367-53407-3 / 9780367534073 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich