Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
ISBN-13:
9781260118179
ISBN-10:
1260118177
Edition:
1
Author:
O. Sami Saydjari
Publication date:
2018
Publisher:
McGraw Hill
Format:
Paperback
592 pages
Category:
Networking & Cloud Computing
,
Network Security
,
Security & Encryption
,
Hacking
FREE US shipping
on ALL non-marketplace orders
Rent
35 days
Due Jun 23, 2024
35 days
from $42.95
USD
Marketplace
from $53.35
USD
Marketplace offers
Seller
Condition
Note
Seller
Condition
New
Brand New! Not overstocks! Brand New direct from the publisher! Ships in sturdy cardboard packaging.
Book details
ISBN-13:
9781260118179
ISBN-10:
1260118177
Edition:
1
Author:
O. Sami Saydjari
Publication date:
2018
Publisher:
McGraw Hill
Format:
Paperback
592 pages
Category:
Networking & Cloud Computing
,
Network Security
,
Security & Encryption
,
Hacking
Summary
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time (ISBN-13: 9781260118179 and ISBN-10: 1260118177), written by authors
O. Sami Saydjari, was published by McGraw Hill in 2018.
With an overall rating of 4.2 stars, it's a notable title among other
Networking & Cloud Computing
(Network Security, Security & Encryption, Hacking) books. You can easily purchase or rent Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time (Paperback) from BooksRun,
along with many other new and used
Networking & Cloud Computing
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $3.42.
Description
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks
This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.
Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including:
• Defining the fundamental nature and full breadth of the cybersecurity problem
• Adopting an essential perspective that considers attacks, failures, and attacker mindsets
• Developing and implementing risk-mitigating, systems-based solutions
• Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks
This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.
Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including:
• Defining the fundamental nature and full breadth of the cybersecurity problem
• Adopting an essential perspective that considers attacks, failures, and attacker mindsets
• Developing and implementing risk-mitigating, systems-based solutions
• Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}