Designing secure systems. (Record no. 5893)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03124cam a2200493Mi 4500 |
001 - CONTROL NUMBER | |
control field | 9781003144182 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FlBoTFG |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240213122831.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210806s2022 xx o 0|| 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | OCoLC-P |
Language of cataloging | eng |
Description conventions | rda |
Transcribing agency | OCoLC-P |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000415100 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000415104 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000415148 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000415147 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781003144182 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1003144187 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 0367700018 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780367700010 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1262964916 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC-P)1262964916 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | M45 2022 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 043050 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 051240 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | bicssc |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Melone, Michael, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Designing secure systems. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | [S.l.] : |
Name of publisher, distributor, etc. | CRC Press, |
Date of publication, distribution, etc. | 2022. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology -using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | OCLC-licensed vendor bibliographic record. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Networking / Security |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Programming / Systems Analysis & Design |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Security / General |
Source of heading or term | bisacsh |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Taylor & Francis |
Uniform Resource Identifier | <a href="https://www.taylorfrancis.com/books/9781003144182">https://www.taylorfrancis.com/books/9781003144182</a> |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | OCLC metadata license agreement |
Uniform Resource Identifier | <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a> |
No items available.