Wiley-Interscience
Security Architecture Modeling: A Comprehensive Approach to Enterprise Risk Management
Security Architecture Modeling: A Comprehensive Approach to Enterprise Risk Management
Couldn't load pickup availability
The remainder of the book looks at architectural constructs for various aspects of the IT environment that may be subject to security infractions. Chapter 4 looks at the physical/electromagnetic radiation control function. Chapter 5 looks at perimeters defenses, specifically credential/access verification functions. Chapter 6 examines administrative internally-connected function & privilege levels. This is follows by a discussion of the application defenses Function (Chapter 7); OS defenses functions are covered in Chapter 8. Finally Chapter 9 looks at data and data-at-rest Functions.
This text book is intended for security professionals at all levels in medium-to-large size companies. It is expected to also be useful to Enterprise Architects, vendors, auditors, and students in the IT field.
Share
