Asia Pacific University Library catalogue


Practical cybersecurity architecture : (Record no. 384124)

000 -LEADER
fixed length control field 01982cam a2200253Mu 4500
003 - CONTROL NUMBER IDENTIFIER
control field APU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240607161910.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field ta
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240607s2020 -uk ||| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781838989927 (paperback)
040 ## - CATALOGING SOURCE
Original cataloging agency APU
Language of cataloging english
Transcribing agency APU
Modifying agency SY
050 14 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.52
Item number .M69 2020 c.1
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Moyle, Ed
Relator term author.
9 (RLIN) 49025
245 10 - TITLE STATEMENT
Title Practical cybersecurity architecture :
Statement of responsibility, etc Ed Molley, Diana Kelley.
Remainder of title a guide to creating and implementing robust designs for cybersecurity architects /
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Birmingham, United Kingdom :
Name of publisher, distributor, etc Packt Publishing,
Date of publication, distribution, etc ©2020.
300 ## - PHYSICAL DESCRIPTION
Extent xi, 399 pages :
Other physical details illustrations ;
Dimensions 24 cm .
500 ## - GENERAL NOTE
General note Includes index.
520 ## - SUMMARY, ETC.
Summary, etc Cybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.
650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Security measures
General subdivision Computer security
9 (RLIN) 49026
650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Design and construction
9 (RLIN) 49027
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kelley, Diana
Relator term author.
9 (RLIN) 49028
942 2# - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Invoice number Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Date checked out Copy number Cost, replacement price Price effective from Koha item type PO number
Not Withdrawn Available   Not Damaged Available for loan Book APU Library APU Library Open Shelf 07/06/2024 EMO IV-024003 302.95 1 TK5105.52 .M69 2020 c.1 00013117 27/07/2024 27/07/2024 1 302.95 07/06/2024 General Circulation 302.95