Designing Security Architecture Solutions
Beschrijving
Bol
Computer security is quickly becoming the #1 need to have solution for the Fortune 1000. The process for implementing strong computer and information security is a development cycle requiring that the proposed security solution meets the requirements of the current software in place, and can be easily partitioned and added to the infra-structure. Tackling security architecture from a software engineering perspective With the growth of the Internet, computer security is rapidly becoming a critical business concern. In turn, as security becomes the responsibility of all IT professionals, companies must rethink the way software is built to have confidence that their mission-critical applications are protected and the privacy and integrity of their data is maintained. In this groundbreaking book, Jay Ramachandran, a security expert with AT&T's renowned Network Services organization, explores system security architecture from a software engineering viewpoint. He explains why strong security must be a guiding principle of the development process, describes how to weave security into a system's architecture, and identifies common patterns of implementation found in most security products. This book is an essential reference for software architects and engineers integrating security products into their applications to satisfy corporate security requirements. Offering in-depth discussions of security principles, software process, and security technologies for cryptography, application, database, and operating system security, this book covers: * The integration of architecture reviews and security assessments into the software development process, explaining application architecture as a collection of protected components communicating over secure channels and operating under constraints * Security principles and architecture basics, including the impact of security products and security infrastructure components on applications * Middleware, application, database, and operating system security * Architectural tensions, describing how to balance security against other architectural goals such as high availability and reliability * Enterprise security management, including a case study on how to build financial business cases to justify security costs Wiley Computer Publishing Timely. Practical. Reliable. Visit our Web site at www.wiley.com/compbooks/
Computer security is quickly becoming the #1 need to have solution for the Fortune 1000. The process for implementing strong computer and information security is a development cycle requiring that the proposed security solution meets the requirements of the current software in place, and can be easily partitioned and added to the infra-structure. Tackling security architecture from a software engineering perspective With the growth of the Internet, computer security is rapidly becoming a critical business concern. In turn, as security becomes the responsibility of all IT professionals, companies must rethink the way software is built to have confidence that their mission-critical applications are protected and the privacy and integrity of their data is maintained. In this groundbreaking book, Jay Ramachandran, a security expert with AT&T's renowned Network Services organization, explores system security architecture from a software engineering viewpoint. He explains why strong security must be a guiding principle of the development process, describes how to weave security into a system's architecture, and identifies common patterns of implementation found in most security products. This book is an essential reference for software architects and engineers integrating security products into their applications to satisfy corporate security requirements. Offering in-depth discussions of security principles, software process, and security technologies for cryptography, application, database, and operating system security, this book covers: * The integration of architecture reviews and security assessments into the software development process, explaining application architecture as a collection of protected components communicating over secure channels and operating under constraints * Security principles and architecture basics, including the impact of security products and security infrastructure components on applications * Middleware, application, database, and operating system security * Architectural tensions, describing how to balance security against other architectural goals such as high availability and reliability * Enterprise security management, including a case study on how to build financial business cases to justify security costs Wiley Computer Publishing Timely. Practical. Reliable. Visit our Web site at www.wiley.com/compbooks/
Productspecificaties
EAN |
|
---|---|
Maat |
|
Prijshistorie
Prijzen voor het laatst bijgewerkt op: