IMIST


Vue normale Vue MARC vue ISBD

Designing security architecture solutions /

par Ramachandran, Jay. Publié par : John Wiley, (New York :) Détails physiques : 1 online resource (xxviii, 452 pages) : illustrations ISBN :0471430137; 9780471430131. Année : 2002
Ressources en ligne :
Tags de cette bibliothèque : Pas de tags pour ce titre. Connectez-vous pour ajouter des tags.
    Évaluation moyenne : 0.0 (0 votes)
Type de document Site actuel Cote Statut Date de retour prévue Code à barres Réservations
Livre La bibliothèque des sciences de l'ingénieur
005.8 RAM (Parcourir l'étagère) Disponible 0000000027375
Total des réservations: 0

Includes bibliographical references (pages 421-433) and index.

Architecture and Security -- Architecture Reviews -- Software Process -- Reviews and the Software Development Cycle -- Software Process and Architecture Models -- Kruchten's 4+1 View Model -- The Reference Model for Open Distributed Processing -- Rational's Unified Process -- Software Process and Security -- Architecture Review of a System -- The Architecture Document -- The Introduction Section -- Sections of the Architecture Document -- The Architecture Review Report -- Security Assessments -- What Is a Security Assessment? -- The Organizational Viewpoint -- The Five-Level Compliance Model -- The System Viewpoint -- Pre-Assessment Preparation -- The Security Assessment Meeting -- Security Assessment Balance Sheet Model -- Describe the Application Security Process -- Identify Assets -- Identify Vulnerabilities and Threats -- Identify Potential Risks -- Examples of Threats and Countermeasures -- Post-Assessment Activities -- Why Are Assessments So Hard? -- Matching Cost Against Value -- Why Assessments Are Like the Knapsack Problem -- Why Assessments Are Not Like the Knapsack Problem -- Enterprise Security and Low Amoritized Cost Security Controls -- Security Architecture Basics -- Security As an Architectural Goal -- Corporate Security Policy and Architecture -- Vendor Bashing for Fun and Profit -- Security and Software Architecture -- System Security Architecture Definitions -- Security and Software Process -- Security Design Forces against Other Goals -- Security Principles -- Additional Security-Related Properties.

Tackling security architecture from a software engineering perspective With the growth of the Internet, computer security is rapidly becoming a critical business concern. In turn, as security becomes the responsibility of all IT professionals, companies must rethink the way software is built to have confidence that their mission-critical applications are protected and the privacy and integrity of their data is maintained. In this groundbreaking book, Jay Ramachandran, a security expert with AT & T's renowned Network Services organization, explores system security architecture from a software e.

Il n'y a pas de commentaire pour ce document.

pour proposer un commentaire.
© Tous droits résérvés IMIST/CNRST
Angle Av. Allal Al Fassi et Av. des FAR, Hay Ryad, BP 8027, 10102 Rabat, Maroc
Tél:(+212) 05 37.56.98.00
CNRST / IMIST

Propulsé par Koha