Security Patterns (eBook, ePUB)
Integrating Security and Systems Engineering
Security Patterns (eBook, ePUB)
Integrating Security and Systems Engineering
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security Patterns addresses the full spectrum of security in systems design, using best practice solutions to show how to integrate security in the broader engineering process. * Essential for designers building large-scale systems who want best practice solutions to typical security problems * Real world case studies illustrate how to use…mehr
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 5.19MB
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: John Wiley & Sons
- Seitenzahl: 448
- Erscheinungstermin: 12. Juli 2013
- Englisch
- ISBN-13: 9781118725931
- Artikelnr.: 39120575
- Verlag: John Wiley & Sons
- Seitenzahl: 448
- Erscheinungstermin: 12. Juli 2013
- Englisch
- ISBN-13: 9781118725931
- Artikelnr.: 39120575
Island. Patterns Everywhere. Humans are the Target. Patterns Resolve
Problems and Shape Environments. Towards Pattern Languages. Documenting
Patterns. A Brief Note on The History of Patterns. The Pattern Community
and its Culture. Chapter 2 Security Foundations. Overview. Security
Taxonomy. General Security Resources. Chapter 3 Security Patterns. The
History of Security Patterns. Characteristics of Security Patterns. Why
Security Patterns?. Sources for Security Pattern Mining. Chapter 4 Patterns
Scope and Enterprise Security. The Scope of Patterns in the Book.
Organization Factors. Resulting Organization. Mapping to the Taxonomy.
Organization in the Context of an Enterprise Framework. Chapter 5 The
Security Pattern Landscape. Enterprise Security and Risk Management
Patterns. Identification & Authentication (I&A) Patterns. Access Control
Model Patterns. System Access Control Architecture Patterns. Operating
System Access Control Patterns. Audit and Accounting Patterns. Secure
Internet Applications Patterns. Firewall Architecture Patterns.
Cryptographic Key Management Patterns. Related Security Pattern
Repositories Patterns. Chapter 6 Enterprise Security and Risk Management.
Security Needs Identification for Enterprise Assets. Asset Valuation.
Threat Assessment. Vulnerability Assessment. Risk Determination. Enterprise
Security Approaches. Enterprise Security Services. Enterprise Partner
Communication. Chapter 7 Identification and Authentication (I&A). I&A
Requirements. Automated I&A Design Alternatives. Password Design and Use.
Biometrics Design Alternatives. Chapter 8 Access Control Models.
Authorization. Role-Based Access Control. Multilevel Security. Reference
Monitor. Role Rights Definition. Chapter 9 System Access Control
Architecture. Access Control Requirements. Single Access Point. Check
Point. Security Session. Full Access with Errors Limited Access Chapter 10
Operating System Access Control. Authenticator. Controlled Process Creator.
Controlled Object Factory. Controlled Object Monitor. Controlled Virtual
Address Space. Execution Domain. Controlled Execution Environment. File
Authorization. Chapter 11 Accounting. Security Accounting Requirements.
Audit Requirements. Audit Trails and Logging Requirements. Intrusion
Detection Requirements. Non-Repudiation Requirements. Chapter 12 Firewall
Architectures. Packet Filter Firewall. Proxy-Based Firewall. Stateful
Firewall. Chapter 13 Secure Internet Applications. Information Obscurity.
Secure Channels. Known Partners. Demilitarized Zone. Protection Reverse
Proxy. Integration Reverse Proxy. Front Door. Chapter 14 Case Study: IP
Telephony. IP Telephony at a Glance. The Fundamentals of IP Telephony.
Vulnerabilities of IP Telephony Components. IP Telephony Use Cases.
Securing IP telephony with patterns. Applying Individual Security Patterns.
Conclusion. Chapter 15 Supplementary Concepts. Security Principles and
Security Patterns. Enhancing Security Patterns with Misuse Cases. Chapter
16 Closing Remarks. References. Index.
Island. Patterns Everywhere. Humans are the Target. Patterns Resolve
Problems and Shape Environments. Towards Pattern Languages. Documenting
Patterns. A Brief Note on The History of Patterns. The Pattern Community
and its Culture. Chapter 2 Security Foundations. Overview. Security
Taxonomy. General Security Resources. Chapter 3 Security Patterns. The
History of Security Patterns. Characteristics of Security Patterns. Why
Security Patterns?. Sources for Security Pattern Mining. Chapter 4 Patterns
Scope and Enterprise Security. The Scope of Patterns in the Book.
Organization Factors. Resulting Organization. Mapping to the Taxonomy.
Organization in the Context of an Enterprise Framework. Chapter 5 The
Security Pattern Landscape. Enterprise Security and Risk Management
Patterns. Identification & Authentication (I&A) Patterns. Access Control
Model Patterns. System Access Control Architecture Patterns. Operating
System Access Control Patterns. Audit and Accounting Patterns. Secure
Internet Applications Patterns. Firewall Architecture Patterns.
Cryptographic Key Management Patterns. Related Security Pattern
Repositories Patterns. Chapter 6 Enterprise Security and Risk Management.
Security Needs Identification for Enterprise Assets. Asset Valuation.
Threat Assessment. Vulnerability Assessment. Risk Determination. Enterprise
Security Approaches. Enterprise Security Services. Enterprise Partner
Communication. Chapter 7 Identification and Authentication (I&A). I&A
Requirements. Automated I&A Design Alternatives. Password Design and Use.
Biometrics Design Alternatives. Chapter 8 Access Control Models.
Authorization. Role-Based Access Control. Multilevel Security. Reference
Monitor. Role Rights Definition. Chapter 9 System Access Control
Architecture. Access Control Requirements. Single Access Point. Check
Point. Security Session. Full Access with Errors Limited Access Chapter 10
Operating System Access Control. Authenticator. Controlled Process Creator.
Controlled Object Factory. Controlled Object Monitor. Controlled Virtual
Address Space. Execution Domain. Controlled Execution Environment. File
Authorization. Chapter 11 Accounting. Security Accounting Requirements.
Audit Requirements. Audit Trails and Logging Requirements. Intrusion
Detection Requirements. Non-Repudiation Requirements. Chapter 12 Firewall
Architectures. Packet Filter Firewall. Proxy-Based Firewall. Stateful
Firewall. Chapter 13 Secure Internet Applications. Information Obscurity.
Secure Channels. Known Partners. Demilitarized Zone. Protection Reverse
Proxy. Integration Reverse Proxy. Front Door. Chapter 14 Case Study: IP
Telephony. IP Telephony at a Glance. The Fundamentals of IP Telephony.
Vulnerabilities of IP Telephony Components. IP Telephony Use Cases.
Securing IP telephony with patterns. Applying Individual Security Patterns.
Conclusion. Chapter 15 Supplementary Concepts. Security Principles and
Security Patterns. Enhancing Security Patterns with Misuse Cases. Chapter
16 Closing Remarks. References. Index.