eBook - ePub
Security Patterns
Integrating Security and Systems Engineering
This is a test
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
Security Patterns
Integrating Security and Systems Engineering
Book details
Table of contents
Citations
About This Book
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security Patterns addresses the full spectrum of security in systems design, using best practice solutions to show how to integrate security in the broader engineering process.
- Essential for designers building large-scale systems who want best practice solutions to typical security problems
- Real world case studies illustrate how to use the patterns in specific domains
For more information visit www.securitypatterns.org
Frequently asked questions
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlegoâs features. The only differences are the price and subscription period: With the annual plan youâll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weâve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Security Patterns by Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, Peter Sommerlad in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.
Information
Table of contents
- Cover
- Half Title page
- Title page
- Copyright page
- Dedication
- Foreword
- About this Book
- About the Authors
- Acknowledgements
- Chapter 1: The Pattern Approach
- Chapter 2: Security Foundations
- Chapter 3: Security Patterns
- Chapter 4: Patterns Scope and Enterprise Security
- Chapter 5: The Security Pattern Landscape
- Chapter 6: Enterprise Security and Risk Management
- Chapter 7: Identification and Authentication (I&A)
- Chapter 8: Access Control Models
- Chapter 9: System Access Control Architecture
- Chapter 10: Operating System Access Control
- Chapter 11: Accounting
- Chapter 12: Firewall Architectures
- Chapter 13: Secure Internet Applications
- Chapter 14: Case Study: IP Telephony
- Chapter 15: Supplementary Concepts
- Chapter 16: Closing Remarks
- References
- Index