Secured By Design – eBook

$34.95

Packed with lessons learned over a 40 year career, this book offers methods for securing the entire stack from prying eyes.

This book is a composition of Best Practices and lessons learned over 40 years in the technology business. Almost every day we hear about another hack and theft of a companies data including private information for these systems store. Topics covered include encryption both at rest and over the wire, preventive maintenance, monitoring, and reporting for each item in the stack. To be clear, compromising systems is an ongoing challenge for any company and topics covered in this book are a great place to start.

Also covered are methods for collecting and processing data necessary for reporting, Governance, and providing proactive knowledge when someone is after your data. Hacks are described and chilling examples are available detailing how IT happened. Many examples sound like common sense or “I knew that”, but some of the most destructive intrusions happened because of poor maintenance of IT systems for whatever reason.

Pages: 1140

ISBN – 978-1-7349512-1-9

500 in stock

  Ask a Question

Description

Packed with lessons learned over a 40 year career, this book offers methods for securing the entire stack from prying eyes.

This book is a composition of Best Practices and lessons learned over 40 years in the technology business. Almost every day we hear about another hack and theft of a companies data including private information for these systems store. Topics covered include encryption both at rest and over the wire, preventive maintenance, monitoring, and reporting for each item in the stack. To be clear, compromising systems is an ongoing challenge for any company and topics covered in this book are a great place to start.

Also covered are methods for collecting and processing data necessary for reporting, Governance, and providing proactive knowledge when someone is after your data. Hacks are described and chilling examples are available detailing how IT happened. Many examples sound like common sense or “I knew that”, but some of the most destructive intrusions happened because of poor maintenance of IT systems for whatever reason.

Pages: 1140

ISBN – 978-1-7349512-1-9

Reviews

There are no reviews yet.

Be the first to review “Secured By Design – eBook”

Your email address will not be published. Required fields are marked *

No more offers for this product!

Shipping Policy

Shipping is calculated during checkout. Multiple shipping options will be presented and shipping method is at the discretion of the buyer. These are not managed by Greater Cause Auctions.

Shipping and Delivery Options
Shipping and Delivery Options

Refund Policy

Refund Policies are determined by the seller. Please questions before or during auctions for the most up to date information. These are not managed by Greater Cause Auctions.

refund policy
refund policy

Cancellation / Return / Exchange Policy

Returns and exchanges are at the discretion of the seller creating the auction. These are not managed by Greater Cause Auctions.

return and exchange policy
return and exchange policy

General Inquiries

There are no inquiries yet.