Cybersecurity: a practical engineering approach
Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification of the solutions as well as their efficiency. T...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
2022
|
Ausgabe: | First edition |
Schriftenreihe: | Chapman & Hall/CRC textbooks in computing
|
Schlagworte: | |
Online-Zugang: | FHD01 |
Zusammenfassung: | Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification of the solutions as well as their efficiency. The process follows an engineering process model. Each module builds on a subset of the risks, discussing the knowledge necessary to approach a solution, followed by the security control architecture design and the implementation. The modular approach allows students to focus on more manageable problems, making the learning process simpler and more attractive |
Beschreibung: | 1 Online-Ressource (xxv, 314 Seiten) |
ISBN: | 9781000562392 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV048444317 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220826s2022 |||| o||u| ||||||eng d | ||
020 | |a 9781000562392 |9 9781000562392 | ||
035 | |a (OCoLC)1344262900 | ||
035 | |a (DE-599)BVBBV048444317 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 | ||
100 | 1 | |a Santos, Henrique |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cybersecurity |b a practical engineering approach |c Henrique M.D. Santos |
250 | |a First edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c 2022 | |
300 | |a 1 Online-Ressource (xxv, 314 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Chapman & Hall/CRC textbooks in computing | |
505 | 8 | |a List of Figures, List of Tables, Preface, Contributors, Cybersecurity Fundamentals, Access Control Techniques, Basic Cryptography Operations, Internet and Web Communication Models, Synthesis of Network and Computer Perimeter Security Technologies, Anatomy of Network and Computer Attacks, Bibliography, Index | |
520 | |a Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification of the solutions as well as their efficiency. The process follows an engineering process model. Each module builds on a subset of the risks, discussing the knowledge necessary to approach a solution, followed by the security control architecture design and the implementation. The modular approach allows students to focus on more manageable problems, making the learning process simpler and more attractive | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer Security | |
650 | 4 | |a Réseaux d'ordinateurs / Sécurité / Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Cryptography |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / Viruses |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-0-429-28674-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hbk |z 978-0-367-25242-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, pbk |z 978-1-032-21130-5 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033822583 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=6946955 |l FHD01 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804184371654033408 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Santos, Henrique |
author_facet | Santos, Henrique |
author_role | aut |
author_sort | Santos, Henrique |
author_variant | h s hs |
building | Verbundindex |
bvnumber | BV048444317 |
collection | ZDB-30-PQE |
contents | List of Figures, List of Tables, Preface, Contributors, Cybersecurity Fundamentals, Access Control Techniques, Basic Cryptography Operations, Internet and Web Communication Models, Synthesis of Network and Computer Perimeter Security Technologies, Anatomy of Network and Computer Attacks, Bibliography, Index |
ctrlnum | (OCoLC)1344262900 (DE-599)BVBBV048444317 |
edition | First edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03002nmm a2200541 c 4500</leader><controlfield tag="001">BV048444317</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220826s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000562392</subfield><subfield code="9">9781000562392</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1344262900</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048444317</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Santos, Henrique</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity</subfield><subfield code="b">a practical engineering approach</subfield><subfield code="c">Henrique M.D. Santos</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxv, 314 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Chapman & Hall/CRC textbooks in computing</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">List of Figures, List of Tables, Preface, Contributors, Cybersecurity Fundamentals, Access Control Techniques, Basic Cryptography Operations, Internet and Web Communication Models, Synthesis of Network and Computer Perimeter Security Technologies, Anatomy of Network and Computer Attacks, Bibliography, Index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification of the solutions as well as their efficiency. The process follows an engineering process model. Each module builds on a subset of the risks, discussing the knowledge necessary to approach a solution, followed by the security control architecture design and the implementation. The modular approach allows students to focus on more manageable problems, making the learning process simpler and more attractive</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs / Sécurité / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Viruses</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-0-429-28674-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hbk</subfield><subfield code="z">978-0-367-25242-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, pbk</subfield><subfield code="z">978-1-032-21130-5</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033822583</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=6946955</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048444317 |
illustrated | Not Illustrated |
index_date | 2024-07-03T20:28:44Z |
indexdate | 2024-07-10T09:38:17Z |
institution | BVB |
isbn | 9781000562392 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033822583 |
oclc_num | 1344262900 |
open_access_boolean | |
owner | DE-1050 |
owner_facet | DE-1050 |
physical | 1 Online-Ressource (xxv, 314 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE FHD01_PQE_Kauf |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | CRC Press |
record_format | marc |
series2 | Chapman & Hall/CRC textbooks in computing |
spelling | Santos, Henrique Verfasser aut Cybersecurity a practical engineering approach Henrique M.D. Santos First edition Boca Raton ; London ; New York CRC Press 2022 1 Online-Ressource (xxv, 314 Seiten) txt rdacontent c rdamedia cr rdacarrier Chapman & Hall/CRC textbooks in computing List of Figures, List of Tables, Preface, Contributors, Cybersecurity Fundamentals, Access Control Techniques, Basic Cryptography Operations, Internet and Web Communication Models, Synthesis of Network and Computer Perimeter Security Technologies, Anatomy of Network and Computer Attacks, Bibliography, Index Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification of the solutions as well as their efficiency. The process follows an engineering process model. Each module builds on a subset of the risks, discussing the knowledge necessary to approach a solution, followed by the security control architecture design and the implementation. The modular approach allows students to focus on more manageable problems, making the learning process simpler and more attractive Computer networks / Security measures Computer security Computer Security Réseaux d'ordinateurs / Sécurité / Mesures Sécurité informatique COMPUTERS / Security / General bisacsh COMPUTERS / Cryptography bisacsh COMPUTERS / Security / Viruses bisacsh Computer networks / Security measures fast Computer security fast Kryptologie (DE-588)4033329-2 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 s Kryptologie (DE-588)4033329-2 s DE-604 Erscheint auch als Online-Ausgabe 978-0-429-28674-2 Erscheint auch als Druck-Ausgabe, hbk 978-0-367-25242-7 Erscheint auch als Druck-Ausgabe, pbk 978-1-032-21130-5 |
spellingShingle | Santos, Henrique Cybersecurity a practical engineering approach List of Figures, List of Tables, Preface, Contributors, Cybersecurity Fundamentals, Access Control Techniques, Basic Cryptography Operations, Internet and Web Communication Models, Synthesis of Network and Computer Perimeter Security Technologies, Anatomy of Network and Computer Attacks, Bibliography, Index Computer networks / Security measures Computer security Computer Security Réseaux d'ordinateurs / Sécurité / Mesures Sécurité informatique COMPUTERS / Security / General bisacsh COMPUTERS / Cryptography bisacsh COMPUTERS / Security / Viruses bisacsh Computer networks / Security measures fast Computer security fast Kryptologie (DE-588)4033329-2 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4293034-0 |
title | Cybersecurity a practical engineering approach |
title_auth | Cybersecurity a practical engineering approach |
title_exact_search | Cybersecurity a practical engineering approach |
title_exact_search_txtP | Cybersecurity a practical engineering approach |
title_full | Cybersecurity a practical engineering approach Henrique M.D. Santos |
title_fullStr | Cybersecurity a practical engineering approach Henrique M.D. Santos |
title_full_unstemmed | Cybersecurity a practical engineering approach Henrique M.D. Santos |
title_short | Cybersecurity |
title_sort | cybersecurity a practical engineering approach |
title_sub | a practical engineering approach |
topic | Computer networks / Security measures Computer security Computer Security Réseaux d'ordinateurs / Sécurité / Mesures Sécurité informatique COMPUTERS / Security / General bisacsh COMPUTERS / Cryptography bisacsh COMPUTERS / Security / Viruses bisacsh Computer networks / Security measures fast Computer security fast Kryptologie (DE-588)4033329-2 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
topic_facet | Computer networks / Security measures Computer security Computer Security Réseaux d'ordinateurs / Sécurité / Mesures Sécurité informatique COMPUTERS / Security / General COMPUTERS / Cryptography COMPUTERS / Security / Viruses Kryptologie Zugriffskontrolle |
work_keys_str_mv | AT santoshenrique cybersecurityapracticalengineeringapproach |