Librería: BGV Books LLC, Murray, KY, Estados Unidos de America
EUR 43,47
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: Good. Exact ISBN match. Immediate shipping. No funny business.
Librería: HPB-Red, Dallas, TX, Estados Unidos de America
EUR 40,49
Cantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Librería: Textbooks_Source, Columbia, MO, Estados Unidos de America
Original o primera edición
EUR 73,22
Cantidad disponible: 2 disponibles
Añadir al carritohardcover. Condición: Good. 1st Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes).
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 111,68
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GoldBooks, Denver, CO, Estados Unidos de America
EUR 109,15
Cantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: new. New Copy. Customer Service Guaranteed.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 120,24
Cantidad disponible: 2 disponibles
Añadir al carritoCondición: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 139,89
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 141,89
Cantidad disponible: 2 disponibles
Añadir al carritoCondición: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers.
Idioma: Inglés
Publicado por Taylor & Francis Group, 2015
ISBN 10: 1482233975 ISBN 13: 9781482233971
Librería: Majestic Books, Hounslow, Reino Unido
EUR 178,01
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New. pp. 320.
Idioma: Inglés
Publicado por Taylor & Francis Group, 2015
ISBN 10: 1482233975 ISBN 13: 9781482233971
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 190,41
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. pp. 320.
Idioma: Inglés
Publicado por Apple Academic Press Inc., 2015
ISBN 10: 1482233975 ISBN 13: 9781482233971
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 171,81
Cantidad disponible: 1 disponibles
Añadir al carritoHardback. Condición: New. New copy - Usually dispatched within 4 working days.
EUR 140,83
Cantidad disponible: Más de 20 disponibles
Añadir al carritoGebunden. Condición: New.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 189,38
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 195,28
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Mispah books, Redhill, SURRE, Reino Unido
EUR 185,77
Cantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 218,17
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 252,84
Cantidad disponible: 2 disponibles
Añadir al carritoHardcover. Condición: Brand New. 412 pages. 10.00x7.25x1.00 inches. In Stock.
Idioma: Inglés
Publicado por Taylor & Francis Inc, Bosa Roca, 2015
ISBN 10: 1482233975 ISBN 13: 9781482233971
Librería: Grand Eagle Retail, Bensenville, IL, Estados Unidos de America
EUR 149,33
Cantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: new. Hardcover. Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architects job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer systems existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis:When should the security architect begin the analysis?At what points can a security architect add the most value?What are the activities the architect must execute?How are these activities delivered?What is the set of knowledge domains applied to the analysis?What are the outputs?What are the tips and tricks that make security architecture risk assessment easier?To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after youve seen a sufficient diversity of architectures, youll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Idioma: Inglés
Publicado por Taylor & Francis Inc, Bosa Roca, 2015
ISBN 10: 1482233975 ISBN 13: 9781482233971
Librería: CitiRetail, Stevenage, Reino Unido
EUR 149,43
Cantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: new. Hardcover. Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architects job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer systems existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis:When should the security architect begin the analysis?At what points can a security architect add the most value?What are the activities the architect must execute?How are these activities delivered?What is the set of knowledge domains applied to the analysis?What are the outputs?What are the tips and tricks that make security architecture risk assessment easier?To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after youve seen a sufficient diversity of architectures, youll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
EUR 193,58
Cantidad disponible: Más de 20 disponibles
Añadir al carritoHRD. Condición: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Librería: PBShop.store US, Wood Dale, IL, Estados Unidos de America
EUR 203,19
Cantidad disponible: Más de 20 disponibles
Añadir al carritoHRD. Condición: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Idioma: Inglés
Publicado por Taylor & Francis Group, 2015
ISBN 10: 1482233975 ISBN 13: 9781482233971
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 188,12
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. PRINT ON DEMAND pp. 320.
Idioma: Inglés
Publicado por Apple Academic Press Inc., 2015
ISBN 10: 1482233975 ISBN 13: 9781482233971
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 231,34
Cantidad disponible: 5 disponibles
Añadir al carritoHardback. Condición: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Idioma: Inglés
Publicado por Taylor & Francis Inc, Bosa Roca, 2015
ISBN 10: 1482233975 ISBN 13: 9781482233971
Librería: AussieBookSeller, Truganina, VIC, Australia
EUR 284,56
Cantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: new. Hardcover. Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architects job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer systems existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis:When should the security architect begin the analysis?At what points can a security architect add the most value?What are the activities the architect must execute?How are these activities delivered?What is the set of knowledge domains applied to the analysis?What are the outputs?What are the tips and tricks that make security architecture risk assessment easier?To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after youve seen a sufficient diversity of architectures, youll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions. This item is printed on demand. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 239,51
Cantidad disponible: 1 disponibles
Añadir al carritoBuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.