Publicado por Packt Publishing
Librería: Academic Book Solutions, Medford, NY, Estados Unidos de America
EUR 26,40
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: LikeNew. Used Like New, no missing pages, no damage to binding, may have a remainder mark.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 52,74
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: California Books, Miami, FL, Estados Unidos de America
EUR 58,33
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 59,57
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 58,27
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 58,26
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Publicado por Packt Publishing 3/29/2024, 2024
ISBN 10: 1803235845 ISBN 13: 9781803235844
Idioma: Inglés
Librería: BargainBookStores, Grand Rapids, MI, Estados Unidos de America
EUR 81,88
Convertir monedaCantidad disponible: 5 disponibles
Añadir al carritoPaperback or Softback. Condición: New. Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture. Book.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 66,09
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 90,24
Convertir monedaCantidad disponible: 4 disponibles
Añadir al carritoCondición: New.
Publicado por Packt Publishing Limited, 2024
ISBN 10: 1803235845 ISBN 13: 9781803235844
Idioma: Inglés
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 67,45
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback / softback. Condición: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Librería: Majestic Books, Hounslow, Reino Unido
EUR 93,03
Convertir monedaCantidad disponible: 4 disponibles
Añadir al carritoCondición: New. Print on Demand.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 95,27
Convertir monedaCantidad disponible: 4 disponibles
Añadir al carritoCondición: New. PRINT ON DEMAND.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 85,01
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Master cybersecurity architecture with practical insights, best practices, and essential skills to design, implement, and maintain robust securityKey Features Gain insights into the cybersecurity architect role and master key skills to excel in it Acquire a diverse skill set for becoming a cybersecurity architect through up-to-date, practical examples Discover valuable tips and best practices to launch your career in cybersecurity Purchase of the print or Kindle book includes a free PDF Elektronisches BuchBook DescriptionStepping into the role of a Cybersecurity Architect (CSA) is no mean feat; it requires both upskilling and a fundamental shift in how you view cybersecurity. Written by a seasoned cybersecurity expert with over two decades of experience spanning the public and private sectors, this all-encompassing guide outlines an accessible a path for cybersecurity engineers and newcomers to evolve into architects, sharing best practices to enhance your skills.After a brief introduction to the role and foundational concepts, this book will help you understand the day-to-day challenges faced by CSAs, supported by practical examples. You'll gain insights into assessing and improving your organization's security posture, including system, hardware, and software security. You'll also learn how to set user and system policies and protocols through effective monitoring and enforcement, and understanding countermeasures that protect the system from unauthorized access attempts.To prepare you for the road ahead and augment your existing skills, the book provides invaluable tips and practices that will contribute to your success as a CSA. By the end of this book, you'll be well-equipped to take up the CSA role and execute robust security solutions.What you will learn Get to grips with the foundational concepts and basics of cybersecurity Understand cybersecurity architecture principles through scenario-based examples Navigate the certification landscape and understand key considerations for getting certified Implement zero-trust authentication with practical examples and best practices Find out how to choose commercial and open source tools Address architecture challenges, focusing on mitigating threats and organizational governanceWho this book is forThis book is for cybersecurity engineers or newcomers who aspire to become cybersecurity architects. It is also for cybersecurity professionals looking to transition into a cybersecurity architect role. Solution architects interested in understanding the scope of the role and the necessary skills for success will also find this book useful. Anyone with a basic understanding of computer and networking technologies will be able to make the most of this book.Table of Contents Introduction to Cybersecurity Cybersecurity Foundation What Is a Cybersecurity Architect and What Are Their Responsibilities Cybersecurity Architecture Principles, Design, and Analysis Threat, Risk, and Governance Considerations as an Architect Documentation as a Cybersecurity Architect - Valuable Resources and Guidance for a Cybersecurity Architect Role Entry-Level-to-Architect Roadmap The Certification Dilemma Decluttering the Toolset - Part 1 Decluttering the Toolset - Part 2 Best Practices Being Adaptable as a Cybersecurity Architect Architecture Considerations - Design, Development, and Other Security Strategies - Part 1 Architecture Considerations - Design, Development, and Other Security Strategies - Part 2.