Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Cybersecurity for Architects: Plan and design robust security architectures


Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Key Features

  • Architect complex security structures using standard practices and use cases
  • Integrate security with any architecture solution
  • Implement cybersecurity architecture in various enterprises

Book Description

Solutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging security approaches.

Hands-On Cybersecurity for Architects will help you to successfully design, integrate, and implement complex security structures in any solution whilst ensuring that the solution functions as expected. To start with, you will get to grips with the fundamentals of recent cybersecurity practices, followed by acquiring and understanding your organization's requirements. You will then move on to learning how to plan and design robust security architectures, along with practical approaches to performing various security assessments. Once you have grasped all this, you will learn to design and develop key requirements, such as firewalls, virtual private networks (VPNs), wide area networks (WANs), and digital certifications. In addition to this, you will discover how to integrate upcoming security changes on Bring your own device (BYOD), cloud platforms, and the Internet of Things (IoT), among others. Finally, you will explore how to design frequent updates and upgrades for your systems as per your enterprise's needs.

By the end of this book, you will be able to architect solutions with robust security components for your infrastructure.

What you will learn

  • Understand different security architecture layers and their integration with all solutions
  • Study SWOT analysis and dig into your organization’s requirements to drive the strategy
  • Design and implement a secure email service approach
  • Monitor the age and capacity of security tools and architecture
  • Explore growth projections and architecture strategy
  • Identify trends, as well as what a security architect should take into consideration

Who this book is for

Hands-On Cybersecurity for Architects is for you if you are a security, network, or system administrator interested in taking on more complex responsibilities such as designing and implementing complex security structures. Basic understanding of network and computer security implementation will be helpful. This book is also ideal for non-security architects who want to understand how to integrate security into their solutions.

Table of Contents

  1. Security Architecture History and Overview
  2. Security Governance
  3. Reference Security Architecture
  4. Cybersecurity Architecture Strategy
  5. Program and Strategy Level Work Artifacts
  6. Security Architecture in Waterfall Projects
  7. Security Architecture Project Delivery Artifacts
  8. Architecture Design Document
  9. Security Architecture and Operations
  10. Practical Security Architecture Designs
  11. Trends in Security Architecture Technology
  12. The Future of Security Architecture
  13. Assessments
(HTML tags aren't allowed.)

Semantic Web-Based Information Systems: State-of-the-Art Applications (Advances in Semantic Web and Information Systems, Vol. 1)
Semantic Web-Based Information Systems: State-of-the-Art Applications (Advances in Semantic Web and Information Systems, Vol. 1)
As a new generation of technologies, frameworks, concepts and practices for information systems emerge, practitioners, academicians, and researchers are in need of a source where they can go to educate themselves on the latest innovations in this area. Semantic Web Information Systems: State-of-the-Art Applications establishes value-added...
Mobile Internet: Enabling Technologies and Services
Mobile Internet: Enabling Technologies and Services
The migration of the most common Internet services to a mobile environment has long been an evolving
demand of both business and consumer markets. The ability to be connected to the Internet while on
the go and to benefit from using such applications as e-mail, instant messaging, audio and video
streaming, Web browsing, and
Building JavaScript Games: for Phones, Tablets, and Desktop
Building JavaScript Games: for Phones, Tablets, and Desktop

Building JavaScript Games teaches game programming through a series of engaging, arcade-style games that quickly expand your JavaScript and HTML5 skills. JavaScript is in the top ten most-used programming languages world wide, and is the basis for applications that can run in any modern browser, on any device from smart phone to...

Technology Matters: Questions to Live With
Technology Matters: Questions to Live With

Winner, 2009 Sally Hacker Prize given by the Society for the History of Technology (SHOT). and Choice Outstanding Academic Title, 2006

Technology matters, writes David Nye, because it is inseparable from being human. We have used tools for more than 100,000 years, and their central purpose has not always been to

Programming Microsoft ASP.NET MVC
Programming Microsoft ASP.NET MVC
Until late 2008, I was happy enough with Web Forms. I did recognize its weak points and could nicely work around them with discipline and systematic application of design principles. But a new thing called ASP.NET MVC was receiving enthusiastic reviews by a growing subset of the ASP.NET community. So I started to...
Integral Calculus, 3D Geometry & Vector Booster with Problems & Solutions
Integral Calculus, 3D Geometry & Vector Booster with Problems & Solutions
INTEGRAL CALCULUS, 3D GEOMETRY & VECTOR BOOSTER with Problems & Solutions for JEE Main and Advanced is meant for aspirants preparing for the entrance examinations of different technical institutions, especially NIT/IIT/BITSAT/ IISc. In writing this book, I have drawn heavily from my long teaching experience at National Level...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy