000 -LEADER |
fixed length control field |
01982cam a2200253Mu 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
APU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240607161910.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
ta |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240607s2020 -uk ||| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781838989927 (paperback) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
APU |
Language of cataloging |
english |
Transcribing agency |
APU |
Modifying agency |
SY |
050 14 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.52 |
Item number |
.M69 2020 c.1 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Moyle, Ed |
Relator term |
author. |
9 (RLIN) |
49025 |
245 10 - TITLE STATEMENT |
Title |
Practical cybersecurity architecture : |
Statement of responsibility, etc |
Ed Molley, Diana Kelley. |
Remainder of title |
a guide to creating and implementing robust designs for cybersecurity architects / |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Birmingham, United Kingdom : |
Name of publisher, distributor, etc |
Packt Publishing, |
Date of publication, distribution, etc |
©2020. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xi, 399 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm . |
500 ## - GENERAL NOTE |
General note |
Includes index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Cybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others. |
650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Security measures |
General subdivision |
Computer security |
9 (RLIN) |
49026 |
650 0# - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Design and construction |
9 (RLIN) |
49027 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kelley, Diana |
Relator term |
author. |
9 (RLIN) |
49028 |
942 2# - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Book |