Cybersecurity Design Principles: Building Secure Resilient Architecture

Cybersecurity Design Principles: Building Secure Resilient Architecture

by Richie Miller
Cybersecurity Design Principles: Building Secure Resilient Architecture

Cybersecurity Design Principles: Building Secure Resilient Architecture

by Richie Miller

eBook

$5.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

If you want to become a Cybersecurity Professional, this book is for you!


If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam.

 

BUY THIS BOOK NOW AND GET STARTED TODAY!

 

In this book you will discover:

Baseline Configuration, Diagrams & IP Management  

Data Sovereignty & Data Loss Prevention    

Data Masking, Tokenization & Digital Rights Management        

Geographical Considerations & Cloud Access Security Broker     

Secure Protocols, SSL Inspection & Hashing 

API Gateways & Recovery Sites     

Honeypots, Fake Telemetry & DNS Sinkhole

Cloud Storage and Cloud Computing            

IaaS, PaaS & SaaS          

Managed Service Providers, Fog Computing & Edge Computing

VDI, Virtualization & Containers   

Microservices and APIs  

Infrastructure as Code (IAC) & Software Defined Networking (SDN)            

Service Integrations and Resource Policies   

Environments, Provisioning & Deprovisioning               

Integrity Measurement & Code Analysis       

Security Automation, Monitoring & Validation            

Software Diversity, Elasticity & Scalability    

Directory Services, Federation & Attestation

Embedded Systems & SCADA Security

Smart Devices / IoT & Special Purpose Devices

HVAC, Aircraft/UAV & MFDs

Real Time Operating Systems & Surveillance Systems

Barricades, Mantraps & Alarms

Cameras, Video Surveillance & Guards

Cable Locks, USB Data Blockers, Safes & Fencing

Motion Detection / Infrared & Proximity Readers

Demilitarized Zone & Protected Distribution System

Shredding, Pulping & Pulverizing  

Deguassing, Purging & Wiping     

Cryptographic Terminology and History       

Digital Signatures, Key Stretching & Hashing

Quantum Communications & Elliptic Curve Cryptography

Quantum Computing, Cipher Modes & XOR Function

Encryptions & Blockchains

Asymmetric/Lightweight Encryption & Steganography

Cipher Suites, Random & Quantum Random Number Generators


 

BUY THIS BOOK NOW AND GET STARTED TODAY!


Product Details

ISBN-13: 9781839381744
Publisher: Pastor Publishing Ltd
Publication date: 01/05/2023
Sold by: Barnes & Noble
Format: eBook
Pages: 210
File size: 3 MB
From the B&N Reads Blog

Customer Reviews