Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles 1st Edition 276337

Паперова книга
276337
Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles 1st Edition - фото 1
31.05
2'400

Все про “Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles 1st Edition”

Від видавця

As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to deliver secure solutions. Regulated businesses, in particular, demand rigor in the architectural process to ensure the effectiveness of security controls and continued protection.
This book provides the first comprehensive method for hybrid multicloud security, integrating proven architectural techniques to deliver a comprehensive end-to-end security method with compliance, threat modeling, and zero trust practices. This method ensures repeatability and consistency in the development of secure solution architectures.
Architects will learn how to effectively identify threats and implement countermeasures through a combination of techniques, work products, and a demonstrative case study to reinforce learning. You'll examine:
  • The importance of developing a solution architecture that integrates security for clear communication
  • Roles that security architects perform and how the techniques relate to nonsecurity subject matter experts
  • How security solution architecture is related to design thinking, enterprise security architecture, and engineering
  • How architects can integrate security into a solution architecture for applications and infrastructure using a consistent end-to-end set of practices
  • How to apply architectural thinking to the development of new security solutions
About the Author
Mark Buckwell is a cloud security architect, thought leader, speaker, and trainer with 30 years of experience architecting and delivering security solutions. He is known for leading the successful delivery of global security solutions to protect business-critical enterprise workloads. With an emphasis on regulated environments, he has worked with organizations to develop their security strategies, enterprise architectures, and solution architectures across a variety of industries. He is currently helping clients with the design and delivery of security for hybrid cloud solutions. He has also been using his extensive experience to help develop the next generation of security architects through training security professionals globally and students through an assessed cyber security master's degree module at two UK universities.
Stefaan is an Open Group Level 3 certified security architect at IBM Security. He is also the architect profession leader for the Benelux region and assists IBMers with their architect certification journey. As a senior security architect, he has been leading security transformation projects at organizations throughout Europe. He is also an instructor in security architecture classes, both internally at IBM and externally. In his current role, he is helping clients with enterprise security strategies around zero trust, cyber security mesh architecture (CSMA), and enterprise security architecture topics in general. He is a trusted advisor to CISOs and their teams.
Carsten is an Associate Partner and Open Group Level 2 certified security architect. In his more than 20 years of experience, he has helped organizations develop and implement their security strategies and security architectures across a variety of industries. In his role, he has been leading security transformation projects across Europe. He is also an instructor and co-author of security architecture classes at IBM. In his current role as Associate Partner with IBM Security, he is helping clients with the design, implementation, and management of security solutions within a hybrid cloud context.

Рецензії

0

Всі характеристики

Товар входить до категорії

  • Самовивіз з відділень поштових операторів від 45 ₴ - 80 ₴
  • Доставка поштовими сервісами - тарифи перевізника
Схожі товари
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
267934
Stephanie DomasChristopher Domas
1'700 ₴
Security Chaos Engineering: Sustaining Resilience in Software and Systems 1st Edition
274007
Kelly ShortridgeAaron Rinehart
1'700 ₴
Zero Trust Networks: Building Secure Systems in Untrusted Network 2nd Edition
275838
Razi RaisChristina MorilloDoug BarthEvan Gilman
1'700 ₴
The Definitive Guide to Security in Jakarta EE. Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More. 1st Ed.
244733
Arjan Tijms, Teo Bais, Werner Keil
1'800 ₴
Cryptography and Cryptanalysis in MATLAB. 1st Ed.
244674
Marius Iulian Mihailescu, Stefania Loredana Nita
1'900 ₴
Kubernetes Security and Observability. A Holistic Approach to Securing Containers and Cloud Native Applications. 1st Ed.
244761
Brendan Creane, Amit Gupta
2'000 ₴
Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed.
244753
Andrew Martin, Michael Hausenblas
2'100 ₴
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
261468
Michael KoflerKlaus GebeshuberPeter KloepFrank NeugebauerAndre ZingsheimThomas HacknerMarkus WidlRoland AignerStefan KaniaTobias ScheibleMatthias Wubbeling
2'700 ₴
The Poison Belt
252799
Arthur Conan Doyle
140 ₴150 ₴
Symbols in Art
131769
Matthew Wilson
740 ₴
Народжений бігти
11982
Кристофер Макдугл
650 ₴
Маня і Різдво
263725
Анастасія Шульга
293 ₴390 ₴