Security Architecture: Design, Deployment & Operations

  • Cover Security Architecture: Design, Deployment & Operations
Rp 500.000
Hemat Rp 25.000
Rp 475.000
Judul
Security Architecture: Design, Deployment & Operations
No. ISBN
0072133856
Penerbit
Tanggal terbit
2001
Jumlah Halaman
481
Berat
500 gr
Jenis Cover
-
Dimensi(L x P)
-
Kategori
Computer Books
Bonus
NONE
Text Bahasa
English ·
Lokasi Stok
Gudang Penerbit icon-help
Stok Tidak Tersedia

DESCRIPTION


New from the official RSA Press,this expert resource explains how to design and deploy security successfully across your enterprise?and keep unauthorized users out of your network. You'll get full coverage of VPNs and intrusion detection systems,plus real-world case studies. Apply the latest security technology to real-world corporate and external applications Design a secure solution from start to finish and learn the principles needed for developing solid network architecture using this authoritative guide. You'll find hands-on coverage for deploying a wide range of solutions,including network partitioning,platform hardening,application security and more. Get details on common security practices,standards,and guidelines and learn proven implementation techniques from case studies discussed in each chapter. Written by recognized experts and endorsed by RSA Security Inc.,the most trusted name in e-security,this comprehensive and practical security guide is your essential tool for planning and implementing a safe and reliable enterprise network. This book will show you how to: Develop an information classification and access control plan Use the appropriate security policies and technology to best meet your security requirements Comprehend security infrastructure design principles Utilize appropriate security technology in the most secure method Fully understand the tradeoffs between usability and liability Ensure complete network security across multiple systems,applications,hosts,and devices Develop and apply policies,assess risks,and understand requirements for running security-specific technology Work with and configureIDS,VPN,PKI,and firewalls Deployment of security architecture is now more important than ever as it allows for complex and secure interaction of multiple computer environments, communication protocols, and system infrastructures over public and private networks. To ensure comprehensive security, an organization must address all host systems, applications, and networking devices with a policy that maximizes user convenience and productivity, while at the same time blocking security violations. Network administrators, managers and architects, and other security professionals will find a valuable resource to security architecture in McGraw-Hill/Osbome Media's latest release in its RSA Press line, Security Architecture: Design, Deployment & Operations (ISBN 0-07-213385-6) by Christopher M. King, Curtis E. Dalton, and T. Ertem Osmanoglu. Written by recognized experts and endorsed by RSA Security Inc., this comprehensive and practical security guide is an essential tool for planning and implementing a safe and reliable enterprise network. It presents indepth information on how to design a secure solution from start to finish and demonstrates the principles needed for developing solid security architecture. It provides hands-on guidance for deploying a wide range of solutions, including policy creation, network partitioning, platform hardening, application security, as well as details on common security practices, standards, and guidelines as it applies to the latest technologies. Using business case studies as examples, the authors provide specific, practical information on how to design a security infrastructure and list numerous examples of available security technologies, including new capabilities in wireless security, and how these technologies integrate into an IT infrastructure. "This book provides an excellent cross-section of information security," comments Stephen H. Beck, director of worldwide professional services at RSA Security Inc. "It's a comprehensive, common sense guide to the field of information security that should provide technology consumers with actionable solutions to meet their information security requirements, now and in the future." TABLE OF CONTENTS Chapter 1: Business and Application Drivers (Case Study) Chapter 2: Security Polices, Standards, and Guidelines Chapter 3: Information Classification and Access Control Plan Chapter 4: Applying the Policies to Derive the Requirements Chapter 5: Security Infrastructure Design Principles Chapter 6: Network Partitioning Chapter 7: Virtual Private Networks Chapter 8: Wireless Security Chapter 9: Platform Hardening Chapter 10: Intrusion Detection Systems Chapter 11: Application Security Chapter 12: PKI: Components and Applications Chapter 13: Security Event Management and Consolidation Chapter 14: Security Management Chapter 15: Validation and Maturity

WHY CHOOSE US?

TERLENGKAP + DISCOUNTS
Nikmati koleksi Buku Computer Books terlengkap ditambah discount spesial.
FAST SHIPPING
Pesanan Anda segera Kami proses setelah pembayaran lunas. Dikirim melalui TIKI, JNE, POS, SICEPAT.
BERKUALITAS DAN TERPERCAYA
Semua barang terjamin kualitasnya dan terpercaya oleh ratusan ribu pembeli sejak 2006. Berikut Testimonial dari Pengguna Jasa Bukukita.com
LOWEST PRICE
Kami selalu memberikan harga terbaik, penawaran khusus seperti edisi tanda-tangan dan promo lainnya

Produk digital

WorkLess, EarnMore the trilogy Part 1
Buku Who The Hell Are You? Buku Personal Branding
Buku pengembangan Diri Januari 2020
Buku Populer & Terlaris 2020