Schade – dieser Artikel ist leider ausverkauft. Sobald wir wissen, ob und wann der Artikel wieder verfügbar ist, informieren wir Sie an dieser Stelle.
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This set comprises of Enterprise Level Security and Enterprise Level Security 2. ELS provides a modern alternative to the fortress approach to security. ELS 2 follows on from the first book, which covered the basic concepts of ELS, to give a discussion of advanced topics and solutions.
Andere Kunden interessierten sich auch für
This set comprises of Enterprise Level Security and Enterprise Level Security 2. ELS provides a modern alternative to the fortress approach to security. ELS 2 follows on from the first book, which covered the basic concepts of ELS, to give a discussion of advanced topics and solutions.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 766
- Erscheinungstermin: 20. Dezember 2022
- Englisch
- Abmessung: 234mm x 156mm
- Gewicht: 930g
- ISBN-13: 9780367536121
- ISBN-10: 0367536129
- Artikelnr.: 75651812
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 766
- Erscheinungstermin: 20. Dezember 2022
- Englisch
- Abmessung: 234mm x 156mm
- Gewicht: 930g
- ISBN-13: 9780367536121
- ISBN-10: 0367536129
- Artikelnr.: 75651812
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Dr. Kevin E. Foltz, Institute for Defense Analyses, has over a decade of experience working to improve security in information systems. He has presented and published research on different aspects of enterprise security, security modeling, and high assurance systems. He also has degrees in Mathematics, Computer Science, Electrical Engineering, and Strategic Security Studies. Dr. William R. Simpson, Institute for Defense Analyses, has over two decades of experience working to improve systems security. He has degrees in Aeronautical Engineering and Business Administration, as well as undergoing military and government training. He spent many years as an expert in aeronautics before delving into the field of electronic and system testing, and he has spent the last 20 years on IT-related themes (mostly security, including processes, damage assessments of cyber intrusions, IT security standards, IT security evaluation, and IT architecture).
Enterprise Level Security (1): 1 Introduction SECTION I?BASICS AND
PHILOSOPHY 2 Identity 3 Attributes 4 Access and Privilege 5 Cryptography 6
The Cloud 7 The Network SECTION II?TECHNICAL DETAILS 8 Claims-Based
Authentication 9 Credentials for Access Claims 10 Claims Creation 11
Invoking an Application 12 Cascading Authorization 13 Federation 14 Content
Access Control 15 Delegation 16 The Enterprise Attribute Ecosystem 17
Database Access 18 Building Enterprise Software 19 Vulnerability Analyses
20 An Enterprise Support Desk 21 Network Defense 22 Concluding Remarks
Enterprise Level Security 2: Chapter 1. The First 16 Years. Chapter 2. A
Brief Review of the Initial Book. Chapter 3. Minimal Requirements for the
Advanced Topics. Chapter 4. Identity Claims in High Assurance. Chapter 5.
Cloud Key Management. Chapter 6. Enhanced Assurance Needs. Chapter 7.
Temporary Certificates. Chapter 8. Derived Certificates on Mobile Devices.
Chapter 9. Veracity and Counter Claims. Chapter 10. Delegation of Access
and Privilege. Chapter 11. Escalation of Privilege. Chapter 12. Federation.
Chapter 13. Content Object Uniqueness for Forensics. Chapter 14.
Homomorphic Encryption. Chapter 15. Access and Privilege in Big Data
Analysis. Chapter 16. Data Mediation. Chapter 17. Mobile Ad Hoc. Chapter
18. Endpoint Device Management. Chapter 19. Endpoint Agent Architecture.
Chapter 20. Ports and Protocols. Chapter 21. Asynchronous Messaging.
Chapter 22. Virtual Application Data Center. Chapter 23. Managing System
Changes. Chapter 24. Concluding Remarks.
PHILOSOPHY 2 Identity 3 Attributes 4 Access and Privilege 5 Cryptography 6
The Cloud 7 The Network SECTION II?TECHNICAL DETAILS 8 Claims-Based
Authentication 9 Credentials for Access Claims 10 Claims Creation 11
Invoking an Application 12 Cascading Authorization 13 Federation 14 Content
Access Control 15 Delegation 16 The Enterprise Attribute Ecosystem 17
Database Access 18 Building Enterprise Software 19 Vulnerability Analyses
20 An Enterprise Support Desk 21 Network Defense 22 Concluding Remarks
Enterprise Level Security 2: Chapter 1. The First 16 Years. Chapter 2. A
Brief Review of the Initial Book. Chapter 3. Minimal Requirements for the
Advanced Topics. Chapter 4. Identity Claims in High Assurance. Chapter 5.
Cloud Key Management. Chapter 6. Enhanced Assurance Needs. Chapter 7.
Temporary Certificates. Chapter 8. Derived Certificates on Mobile Devices.
Chapter 9. Veracity and Counter Claims. Chapter 10. Delegation of Access
and Privilege. Chapter 11. Escalation of Privilege. Chapter 12. Federation.
Chapter 13. Content Object Uniqueness for Forensics. Chapter 14.
Homomorphic Encryption. Chapter 15. Access and Privilege in Big Data
Analysis. Chapter 16. Data Mediation. Chapter 17. Mobile Ad Hoc. Chapter
18. Endpoint Device Management. Chapter 19. Endpoint Agent Architecture.
Chapter 20. Ports and Protocols. Chapter 21. Asynchronous Messaging.
Chapter 22. Virtual Application Data Center. Chapter 23. Managing System
Changes. Chapter 24. Concluding Remarks.
Enterprise Level Security (1): 1 Introduction SECTION I?BASICS AND
PHILOSOPHY 2 Identity 3 Attributes 4 Access and Privilege 5 Cryptography 6
The Cloud 7 The Network SECTION II?TECHNICAL DETAILS 8 Claims-Based
Authentication 9 Credentials for Access Claims 10 Claims Creation 11
Invoking an Application 12 Cascading Authorization 13 Federation 14 Content
Access Control 15 Delegation 16 The Enterprise Attribute Ecosystem 17
Database Access 18 Building Enterprise Software 19 Vulnerability Analyses
20 An Enterprise Support Desk 21 Network Defense 22 Concluding Remarks
Enterprise Level Security 2: Chapter 1. The First 16 Years. Chapter 2. A
Brief Review of the Initial Book. Chapter 3. Minimal Requirements for the
Advanced Topics. Chapter 4. Identity Claims in High Assurance. Chapter 5.
Cloud Key Management. Chapter 6. Enhanced Assurance Needs. Chapter 7.
Temporary Certificates. Chapter 8. Derived Certificates on Mobile Devices.
Chapter 9. Veracity and Counter Claims. Chapter 10. Delegation of Access
and Privilege. Chapter 11. Escalation of Privilege. Chapter 12. Federation.
Chapter 13. Content Object Uniqueness for Forensics. Chapter 14.
Homomorphic Encryption. Chapter 15. Access and Privilege in Big Data
Analysis. Chapter 16. Data Mediation. Chapter 17. Mobile Ad Hoc. Chapter
18. Endpoint Device Management. Chapter 19. Endpoint Agent Architecture.
Chapter 20. Ports and Protocols. Chapter 21. Asynchronous Messaging.
Chapter 22. Virtual Application Data Center. Chapter 23. Managing System
Changes. Chapter 24. Concluding Remarks.
PHILOSOPHY 2 Identity 3 Attributes 4 Access and Privilege 5 Cryptography 6
The Cloud 7 The Network SECTION II?TECHNICAL DETAILS 8 Claims-Based
Authentication 9 Credentials for Access Claims 10 Claims Creation 11
Invoking an Application 12 Cascading Authorization 13 Federation 14 Content
Access Control 15 Delegation 16 The Enterprise Attribute Ecosystem 17
Database Access 18 Building Enterprise Software 19 Vulnerability Analyses
20 An Enterprise Support Desk 21 Network Defense 22 Concluding Remarks
Enterprise Level Security 2: Chapter 1. The First 16 Years. Chapter 2. A
Brief Review of the Initial Book. Chapter 3. Minimal Requirements for the
Advanced Topics. Chapter 4. Identity Claims in High Assurance. Chapter 5.
Cloud Key Management. Chapter 6. Enhanced Assurance Needs. Chapter 7.
Temporary Certificates. Chapter 8. Derived Certificates on Mobile Devices.
Chapter 9. Veracity and Counter Claims. Chapter 10. Delegation of Access
and Privilege. Chapter 11. Escalation of Privilege. Chapter 12. Federation.
Chapter 13. Content Object Uniqueness for Forensics. Chapter 14.
Homomorphic Encryption. Chapter 15. Access and Privilege in Big Data
Analysis. Chapter 16. Data Mediation. Chapter 17. Mobile Ad Hoc. Chapter
18. Endpoint Device Management. Chapter 19. Endpoint Agent Architecture.
Chapter 20. Ports and Protocols. Chapter 21. Asynchronous Messaging.
Chapter 22. Virtual Application Data Center. Chapter 23. Managing System
Changes. Chapter 24. Concluding Remarks.