| 000 | 01564nam a2200289 i 4500 | ||
|---|---|---|---|
| 003 | CSPC | ||
| 005 | 20241004092639.0 | ||
| 008 | 241004s2018 -uk 001 0 eng d | ||
| 020 | _a9781838989927 | ||
| 040 |
_aCSPC _beng _cCSPC _erda |
||
| 050 | 4 | _aQA76.9.A25 | |
| 082 | 4 |
_223 _a005.8 _bM875p |
|
| 100 | 1 |
_aMoyle, Ed, _eauthor. |
|
| 245 | 1 | 0 |
_aPractical cybersecurity architecture : _ba guide to creating and implementing robust designs for cybersecurity architects / _cEd Moyle and Diana Kelley. |
| 264 | 1 |
_aBirmingham, UK : _bPackt Publishing Ltd., _c2020. |
|
| 300 |
_axi, 399 pages ; _c23 cm. |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 500 | _aIncludes index. | ||
| 505 | 0 | _aSection 1: Security architecture -- What is cybersecurity architecture? -- The core of solution building -- Section 2: Building an architecture -- Building an architecture - scope and requirements -- Building an architecture - your toolbox -- Building an architecture - developing enterprise blueprints -- Building an architecture - application blueprints -- Section 3: Execution -- Execution - applying architecture models -- Execution - Future-proofing -- Putting it all together. | |
| 650 | 0 |
_aComputer security _xDesign and construction. |
|
| 650 | 0 |
_aComputer networks _vSecurity measures _xDesign and construction. |
|
| 700 | 1 |
_aKelley, Diana, _eauthor. |
|
| 942 |
_2ddc _n0 _cBK _e23 _h005.8 _iM875p _kGRD _m2020 |
||
| 999 |
_c28287 _d28287 |
||