نام کتاب
Security Architecture for Hybrid Cloud

A Practical Method for Designing Security Using Zero Trust Principles

Mark Buckwell, Stefaan Van daele, Carsten Horst

Paperback477 Pages
PublisherO'Reilly
Edition1
LanguageEnglish
Year2024
ISBN9781098157777
488
A5634
انتخاب نوع چاپ:
جلد سخت
745,000ت
0
جلد نرم
685,000ت
0
طلق پاپکو و فنر
695,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:B5
رنگ صفحات:دارای متن و کادر رنگی
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#Security

#Hybrid_Cloud

توضیحات

As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to deliver secure solutions. Regulated businesses, in particular, demand rigor in the architectural process to ensure the effectiveness of security controls and continued protection.


This book provides the first comprehensive method for hybrid multicloud security, integrating proven architectural techniques to deliver a comprehensive end-to-end security method with compliance, threat modeling, and zero trust practices. This method ensures repeatability and consistency in the development of secure solution architectures.


Architects will learn how to effectively identify threats and implement countermeasures through a combination of techniques, work products, and a demonstrative case study to reinforce learning. You'll examine:

  • The importance of developing a solution architecture that integrates security for clear communication
  • Roles that security architects perform and how the techniques relate to nonsecurity subject matter experts
  • How security solution architecture is related to design thinking, enterprise security architecture, and engineering
  • How architects can integrate security into a solution architecture for applications and infrastructure using a consistent end-to-end set of practices
  • How to apply architectural thinking to the development of new security solutions


Table of Contents

Part I. Concepts

Chapter 1. Introduction

Chapter 2. Architecture Concepts

Part II. Plan

Chapter 3. Enterprise Context

Chapter 4. Requirements and Constraints

Part III. Design

Chapter 5. System Context

Chapter 6. Application Security

Chapter 7. Shared Responsibilities

Chapter 8. Infrastructure Security

Chapter 9. Architecture Patterns and Decisions

Part IV. Build

Chapter 10. Secure Development and Assurance

Part V. Run

Chapter 11. Security Operations

Part VI. Close

Appendix A. Case Study

Appendix B. Artifact Mapping

Appendix C. Exercise Solutions


About the Authors

Mark Buckwell is a cloud security architect, thought leader, speaker, and trainer with 30 years of experience architecting and delivering security solutions. He is known for leading the successful delivery of global security solutions to protect business-critical enterprise workloads. With an emphasis on regulated environments, he has worked with organizations to develop their security strategies, enterprise architectures, and solution architectures across a variety of industries. He is currently helping clients with the design and delivery of security for hybrid cloud solutions. He has also been using his extensive experience to help develop the next generation of security architects through training security professionals globally and students through an assessed cyber security master's degree module at two UK universities.


Stefaan Van daele is an Open Group Level 3 certified security architect at IBM Security. He is also the architect profession leader for the Benelux region and assists IBMers with their architect certification journey. As a senior security architect, he has been leading security transformation projects at organizations throughout Europe. He is also an instructor in security architecture classes, both internally at IBM and externally. In his current role, he is helping clients with enterprise security strategies around zero trust, cyber security mesh architecture (CSMA), and enterprise security architecture topics in general. He is a trusted advisor to CISOs and their teams.


Carsten Horst is an Associate Partner and Open Group Level 2 certified security architect. In his more than 20 years of experience, he has helped organizations develop and implement their security strategies and security architectures across a variety of industries. In his role, he has been leading security transformation projects across Europe. He is also an instructor and co-author of security architecture classes at IBM. In his current role as Associate Partner with IBM Security, he is helping clients with the design, implementation, and management of security solutions within a hybrid cloud context.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
Cloud
759
CompTIA Cloud+ Guide to Cloud Computing
1,115,000 تومان
Data Science
976
Data Science on the Google Cloud Platform
669,000 تومان
Cloud
496
AWS Certified Cloud Practitioner CLF-C02 Cert Guide
585,000 تومان
هک و امنیت
981
CCSP Certified Cloud Security Professional All-in-One Exam Guide
690,000 تومان
Cloud
658
3D Point Cloud Analysis
332,000 تومان
Cloud
1,525
Cloud Security Handbook
691,000 تومان
Cloud
940
Building a Future-Proof Cloud Infrastructure
461,000 تومان
هک و امنیت
488
Security Architecture for Hybrid Cloud
685,000 تومان
Deep Learning
1,024
Practical Deep Learning for Cloud, Mobile, and Edge
1,126,000 تومان
Cloud
927
Cloud Computing Patterns
595,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©