Security patterns : integrating security and systems engineering / Markus Schumacher ... [et al.].

By: Schumacher, MarkusContributor(s): Schumacher, MarkusMaterial type: TextTextSeries: Wiley series in software design patternsPublisher: Chichester, England ; Hoboken, NJ : John Wiley & Sons, c2006Description: xxxiii, 565 p. : ill. ; 24 cmISBN: 0470858842 (cloth : alk. paper); 9780470858844 (cloth : alk. paper)Subject(s): Computer security | Systems engineeringDDC classification: 005.8,SCH LOC classification: QA76.9.A25 | S438 2006Online resources: Table of contents only | Publisher description | Contributor biographical information
Contents:
The Pattern Approach (Page-1), Security Foundations(Page-15),Security Patterns(Page-29), Patterns Scope and Enterprise Security(Page-47),The Security Pattern Landscape(Page-59), Enterprise Security and Risk Management(Page-85),Identification and Authentication (I&A) (Page-187), Access Control Models(Page-243),System Access Control Architecture(Page-265), Operating System Access Control(Page-321),Accounting(Page-355),Firewall architectures(Page-403), Secure Internet Applications(Page-423), Case Study: IP Telephony(Page-481), Supplementary Concepts(Page-503),Closing Remarks(Page-531).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,SCH (Browse shelf) Available Almirah No.9, Shelf No.2 MCS37677
Total holds: 0

The Pattern Approach (Page-1), Security Foundations(Page-15),Security Patterns(Page-29), Patterns Scope and Enterprise Security(Page-47),The Security Pattern Landscape(Page-59), Enterprise Security and Risk Management(Page-85),Identification and Authentication (I&A) (Page-187), Access Control Models(Page-243),System Access Control Architecture(Page-265), Operating System Access Control(Page-321),Accounting(Page-355),Firewall architectures(Page-403), Secure Internet Applications(Page-423), Case Study: IP Telephony(Page-481), Supplementary Concepts(Page-503),Closing Remarks(Page-531).

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.