Get Free Shipping on orders over $79
Enterprise Level Security : Securing Information Systems in an Uncertain World - William R. Simpson

Enterprise Level Security

Securing Information Systems in an Uncertain World

By: William R. Simpson

Hardcover | 13 May 2016 | Edition Number 1

At a Glance

Hardcover


RRP $221.00

$193.75

12%OFF

or 4 interest-free payments of $48.44 with

 or 

Available for Backorder. We will order this from our supplier however there isn't a current ETA.

Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process.

Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise.

The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project.

The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.

More in Computer Science

Microsoft 365 Excel All-in-One For Dummies : Excel for Dummies - David H. Ringstrom
Microsoft 365 Excel For Dummies : For Dummies (Computer/Tech) - David H. Ringstrom
Machine Learning For Dummies : For Dummies (Computer/Tech) - Luca Massaron
Creative Machines : AI, Art & Us - Maya Ackerman

RRP $57.95

$44.75

23%
OFF
The Tech Coup : How to Save Democracy from Silicon Valley - Marietje Schaake
AI for Business : A Guide to AI Adoption - Jon Whittle

RRP $49.99

$40.75

18%
OFF
New Beginnings : why change is so difficult and how to achieve it - Stefan Klein
Python All-in-One For Dummies : 3rd Edition - Alan Simpson

RRP $74.95

$55.75

26%
OFF
The Shortest History of AI - Toby Walsh

RRP $27.99

$22.75

19%
OFF
Genesis : Artificial Intelligence, Hope, and the Human Spirit - Eric Schmidt
Building Microservices : Designing Fine-Grained Systems 2nd Edition - Sam Newman
New Forms of Civic Resistance and Activism - Tine Munk