93,77 €
104,19 €
-10% with code: EXTRA
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
93,77
104,19 €
  • We will send in 10–14 business days.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Cutting-edge cybersecurity solutions to defend against the most sophisticated attacksThis professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain…
104.19
  • SAVE -10% with code: EXTRA

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time (e-book) (used book) | bookbook.eu

Reviews

(3.92 Goodreads rating)

Description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.




Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks


This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.


Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including:


- Defining the fundamental nature and full breadth of the cybersecurity problem
- Adopting an essential perspective that considers attacks, failures, and attacker mindsets
- Developing and implementing risk-mitigating, systems-based solutions
- Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space




EXTRA 10 % discount with code: EXTRA

93,77
104,19 €
We will send in 10–14 business days.

The promotion ends in 23d.06:20:44

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,04 Book Euros!?

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.




Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks


This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.


Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including:


- Defining the fundamental nature and full breadth of the cybersecurity problem
- Adopting an essential perspective that considers attacks, failures, and attacker mindsets
- Developing and implementing risk-mitigating, systems-based solutions
- Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space




Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)