عرض عادي

Enterprise level security : securing Information Systems in an uncertain world / William R. Simpson.

بواسطة:نوع المادة : نصنصالناشر:Boca Raton : CRC Press, Taylor and Francis Group, 2016وصف:xxxi, 395 pages : illustrations ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781498764452
  • 1498764452
الموضوع:تصنيف مكتبة الكونجرس:
  • TK5105.59 .S563 2016
المحتويات:
Introduction -- BASICS AND PHILOSOPHY -- Identity -- Attributes -- Access and Privilege -- Cryptography -- The Cloud -- The Network -- TECHNICAL DETAILS -- Claims-Based Authentication -- Credentials for Access Claims -- Claims Creation -- Invoking an Application -- Cascading Authorization -- Federation -- Content Access Control -- Delegation -- The Enterprise Attribute Ecosystem -- Database Access -- Building Enterprise Software -- Vulnerability Analyses -- An Enterprise Support Desk -- Network Defense -- Concluding Remarks.
ملخص:Enterprise Level Security: Securing Information Systems in an Uncertain Worldprovides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process. Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise. The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project. The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense. -- Provided by publisher.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة TK5105.59 .S563 2016 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30020000045518
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة TK5105.59 .S563 2016 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30020000045788

Includes bibliographical references and index.

Introduction -- BASICS AND PHILOSOPHY -- Identity -- Attributes -- Access and Privilege -- Cryptography -- The Cloud -- The Network -- TECHNICAL DETAILS -- Claims-Based Authentication -- Credentials for Access Claims -- Claims Creation -- Invoking an Application -- Cascading Authorization -- Federation -- Content Access Control -- Delegation -- The Enterprise Attribute Ecosystem -- Database Access -- Building Enterprise Software -- Vulnerability Analyses -- An Enterprise Support Desk -- Network Defense -- Concluding Remarks.

Enterprise Level Security: Securing Information Systems in an Uncertain Worldprovides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process. Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise. The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project. The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense. -- Provided by publisher.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة