Enterprise level security 1 & 2

This set comprises of Enterprise Level Security and Enterprise Level Security 2. ELS provides a modern alternative to the fortress approach to security. ELS 2 follows on from the first book, which covered the basic concepts of ELS, to give a discussion of advanced topics and solutions

Bibliographic Details
Main Authors: Foltz, Kevin E., Simpson, William Randolph (Author)
Format: eBook
Language:English
Published: Boca Raton CRC Press 2020
Edition:1st
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Description
Summary:This set comprises of Enterprise Level Security and Enterprise Level Security 2. ELS provides a modern alternative to the fortress approach to security. ELS 2 follows on from the first book, which covered the basic concepts of ELS, to give a discussion of advanced topics and solutions
Item Description:<p></p><p><strong>Enterprise Level Security (1)</strong></p><p><strong></strong></p><p><strong>1 Introduction</strong></p><p><strong> </strong></p><p>1.1 Problem Description</p><p>1.1.1 Success beyond Anticipation</p><p>1.1.2 But, . - It Started Long before ­at</p><p>1.1.2.1 A Brief History of the Development of the WWW</p><p>1 1.1.3 Fast-Forward to Today</p><p>1.2 What Is Enterprise Level Security?</p><p>1.3 Distributed versus Centralized Security</p><p>1.3.1 Case Study: Boat Design</p><p>1.3.2 Case Study Enterprise Information Technology Environment</p><p>1.3.3 Security Aspects</p><p>1.3.3.1 Confidentiality</p><p>1.3.3.2 Integrity</p><p>1.3.3.3 Availability</p><p>1.3.3.4 Authenticity</p><p>1.3.3.5 Nonrepudiation</p><p>1.4 Crafting a Security Model</p><p>1.4.1 ­e Assumptions</p><p>1.4.2 Tenets: Digging beneath the Security Aspects</p><p>1.5 Entities and Claims</p><p>1.5.1 Credentialing</p><p>1.6 Robust Assured Information Sharing</p><p>1.6.1 Security Requirements</p><p>1.6.2 Security Mechanisms</p><p>1.6.3 Goals and Assumptions of IA Architecture</p><p>1.6.4 Assumptions</p><p>1.6.5 A Framework for Entities in Distributed Systems</p><p>1.7 Key Concepts</p><p>1.7.1 ELS-Specific Concepts</p><p>1.7.2 Mapping between . - Tenets and Key Concepts</p><p>1.7.3 Enterprise-Level Derived Requirements</p><p>1.7.4 Mapping between Key Concepts and Derived Requirements</p><p>1.8 Two Steps Forward and One Step Back</p><p>1.9 ­e Approximate Time-Based Crafting</p><p>1.10 Summary</p><p> </p><p><strong>SECTION I BASICS AND PHILOSOPHY</strong></p><p><strong> </strong></p><p><strong>2 Identity</strong></p><p><strong> </strong></p><p>2.1 Who Are You?</p><p>2.2 Naming</p><p>2.3 Identity and Naming: Case Study</p><p>2.4 Implications for Information Security</p><p>2.5 Personas</p><p>2.6 Identity Summary</p><p> </p><p><strong>3 Attributes</strong></p><p><strong> </strong></p><p>3.1 Facts and Descriptors</p><p>3.2 An Attribute Ecosystem</p><p>3.3 Data Sanitization</p><p>3.3.1 Guarded an
Physical Description:1 online resource illustrations (black and white)
ISBN:9781000165173
1000165213
1000165175
1000165256
9781003082118
9781000165258
1003082114
9781000165210