
{"id":246,"date":"2023-04-16T18:23:17","date_gmt":"2023-04-17T02:23:17","guid":{"rendered":"http:\/\/apps.esntech.com\/?post_type=product&#038;p=246"},"modified":"2025-06-19T06:47:43","modified_gmt":"2025-06-19T14:47:43","slug":"securedbydesign-2","status":"publish","type":"product","link":"https:\/\/apps.esntech.com\/?product=securedbydesign-2","title":{"rendered":"Secured By Design &#8211; eBook"},"content":{"rendered":"<p>Packed with lessons learned over a 40 year career, this book offers methods for securing the entire stack from prying eyes. <\/p>\n<p>This book is a composition of Best Practices and lessons learned over 40 years in the technology business. Almost every day we hear about another hack and theft of a companies data including private information for these systems store. Topics covered include encryption both at rest and over the wire, preventive maintenance, monitoring, and reporting for each item in the stack. To be clear, compromising systems is an ongoing challenge for any company and topics covered in this book are a great place to start. <\/p>\n<p>Also covered are methods for collecting and processing data necessary for reporting, Governance, and providing proactive knowledge when someone is after your data. Hacks are described and chilling examples are available detailing how IT happened. Many examples sound like common sense or &#8220;I knew that&#8221;, but some of the most destructive intrusions happened because of poor maintenance of IT systems for whatever reason. <\/p>\n<p>Pages: 1140<\/p>\n<p>ISBN &#8211; 978-1-7349512-1-9<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Packed with lessons learned over a 40 year career, this book offers methods for securing the entire stack from prying eyes. <\/p>\n<p>This book is a composition of Best Practices and lessons learned over 40 years in the technology business. Almost every day we hear about another hack and theft of a companies data including private information for these systems store. Topics covered include encryption both at rest and over the wire, preventive maintenance, monitoring, and reporting for each item in the stack. To be clear, compromising systems is an ongoing challenge for any company and topics covered in this book are a great place to start. <\/p>\n<p>Also covered are methods for collecting and processing data necessary for reporting, Governance, and providing proactive knowledge when someone is after your data. Hacks are described and chilling examples are available detailing how IT happened. Many examples sound like common sense or &#8220;I knew that&#8221;, but some of the most destructive intrusions happened because of poor maintenance of IT systems for whatever reason. <\/p>\n<p>Pages: 1140<\/p>\n<p>ISBN &#8211; 978-1-7349512-1-9<\/p>\n","protected":false},"featured_media":325,"comment_status":"open","ping_status":"closed","template":"","meta":{"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","_glsr_average":0,"_glsr_ranking":0,"_glsr_reviews":0,"jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"product_brand":[],"product_cat":[23,51],"product_tag":[],"class_list":{"0":"post-246","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-engineeredproductstechnology","7":"product_cat-technology-books","9":"first","10":"instock","11":"taxable","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"a3_pvc":{"activated":false,"total_views":0,"today_views":0},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secured By Design - eBook - Engineered Products &amp; Technology L.L.C.<\/title>\n<meta name=\"description\" content=\"This book tackles the challenges of building, retrofitting, and securing technology systems. We speak to securing the entire technology stack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/apps.esntech.com\/?product=securedbydesign-2\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secured By Design - eBook - Engineered Products &amp; Technology L.L.C.\" \/>\n<meta property=\"og:description\" content=\"This book tackles the challenges of building, retrofitting, and securing technology systems. We speak to securing the entire technology stack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/apps.esntech.com\/?product=securedbydesign-2\" \/>\n<meta property=\"og:site_name\" content=\"Engineered Products &amp; Technology L.L.C.\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-19T14:47:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/apps.esntech.com\/wp-content\/uploads\/2023\/04\/imagePRGB-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2075\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/apps.esntech.com\\\/?product=securedbydesign-2\",\"url\":\"https:\\\/\\\/apps.esntech.com\\\/?product=securedbydesign-2\",\"name\":\"Secured By Design - eBook - Engineered Products &amp; Technology L.L.C.\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/apps.esntech.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/apps.esntech.com\\\/?product=securedbydesign-2#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/apps.esntech.com\\\/?product=securedbydesign-2#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/apps.esntech.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/imagePRGB-scaled.jpg\",\"datePublished\":\"2023-04-17T02:23:17+00:00\",\"dateModified\":\"2025-06-19T14:47:43+00:00\",\"description\":\"This book tackles the challenges of building, retrofitting, and securing technology systems. We speak to securing the entire technology stack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/apps.esntech.com\\\/?product=securedbydesign-2#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/apps.esntech.com\\\/?product=securedbydesign-2\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/apps.esntech.com\\\/?product=securedbydesign-2#primaryimage\",\"url\":\"https:\\\/\\\/apps.esntech.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/imagePRGB-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/apps.esntech.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/imagePRGB-scaled.jpg\",\"width\":2075,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/apps.esntech.com\\\/?product=securedbydesign-2#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\\\/\\\/apps.esntech.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"e-Mall\",\"item\":\"https:\\\/\\\/apps.esntech.com\\\/?page_id=8\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secured By Design &#8211; eBook\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\\\/\\\/apps.esntech.com\\\/#website\",\"url\":\"http:\\\/\\\/apps.esntech.com\\\/\",\"name\":\"Engineered Products &amp; Technology L.L.C.\",\"description\":\"Committed to Building Better Products !!!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\\\/\\\/apps.esntech.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secured By Design - eBook - Engineered Products &amp; Technology L.L.C.","description":"This book tackles the challenges of building, retrofitting, and securing technology systems. We speak to securing the entire technology stack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/apps.esntech.com\/?product=securedbydesign-2","og_locale":"en_US","og_type":"article","og_title":"Secured By Design - eBook - Engineered Products &amp; Technology L.L.C.","og_description":"This book tackles the challenges of building, retrofitting, and securing technology systems. We speak to securing the entire technology stack.","og_url":"https:\/\/apps.esntech.com\/?product=securedbydesign-2","og_site_name":"Engineered Products &amp; Technology L.L.C.","article_modified_time":"2025-06-19T14:47:43+00:00","og_image":[{"width":2075,"height":2560,"url":"https:\/\/apps.esntech.com\/wp-content\/uploads\/2023\/04\/imagePRGB-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/apps.esntech.com\/?product=securedbydesign-2","url":"https:\/\/apps.esntech.com\/?product=securedbydesign-2","name":"Secured By Design - eBook - Engineered Products &amp; Technology L.L.C.","isPartOf":{"@id":"http:\/\/apps.esntech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/apps.esntech.com\/?product=securedbydesign-2#primaryimage"},"image":{"@id":"https:\/\/apps.esntech.com\/?product=securedbydesign-2#primaryimage"},"thumbnailUrl":"https:\/\/apps.esntech.com\/wp-content\/uploads\/2023\/04\/imagePRGB-scaled.jpg","datePublished":"2023-04-17T02:23:17+00:00","dateModified":"2025-06-19T14:47:43+00:00","description":"This book tackles the challenges of building, retrofitting, and securing technology systems. We speak to securing the entire technology stack.","breadcrumb":{"@id":"https:\/\/apps.esntech.com\/?product=securedbydesign-2#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/apps.esntech.com\/?product=securedbydesign-2"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/apps.esntech.com\/?product=securedbydesign-2#primaryimage","url":"https:\/\/apps.esntech.com\/wp-content\/uploads\/2023\/04\/imagePRGB-scaled.jpg","contentUrl":"https:\/\/apps.esntech.com\/wp-content\/uploads\/2023\/04\/imagePRGB-scaled.jpg","width":2075,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/apps.esntech.com\/?product=securedbydesign-2#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/apps.esntech.com\/"},{"@type":"ListItem","position":2,"name":"e-Mall","item":"https:\/\/apps.esntech.com\/?page_id=8"},{"@type":"ListItem","position":3,"name":"Secured By Design &#8211; eBook"}]},{"@type":"WebSite","@id":"http:\/\/apps.esntech.com\/#website","url":"http:\/\/apps.esntech.com\/","name":"Engineered Products &amp; Technology L.L.C.","description":"Committed to Building Better Products !!!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/apps.esntech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/apps.esntech.com\/index.php?rest_route=\/wp\/v2\/product\/246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/apps.esntech.com\/index.php?rest_route=\/wp\/v2\/product"}],"about":[{"href":"https:\/\/apps.esntech.com\/index.php?rest_route=\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/apps.esntech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=246"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/apps.esntech.com\/index.php?rest_route=\/wp\/v2\/media\/325"}],"wp:attachment":[{"href":"https:\/\/apps.esntech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=246"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/apps.esntech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fproduct_brand&post=246"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/apps.esntech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fproduct_cat&post=246"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/apps.esntech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fproduct_tag&post=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}