• Complain

Neil Rerup - Hands-On Cybersecurity for Architects

Here you can read online Neil Rerup - Hands-On Cybersecurity for Architects full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2018, publisher: Packt Publishing, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Neil Rerup Hands-On Cybersecurity for Architects
  • Book:
    Hands-On Cybersecurity for Architects
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2018
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Hands-On Cybersecurity for Architects: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Hands-On Cybersecurity for Architects" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

There has been so much written over the years on the subject of security. IT security. Information security. Cybersecurity. All focused on security. But heres the problem: from a more practical point of view, security is more about quality assurance for your architectures rather than being about ensuring that risks are mitigated.Most people forget that the core business of an enterprise is business. Its not security in any form. Securitymore specifically, cybersecurityis meant to provide a clear understanding to the business as to what the security risks are and how to potentially mitigate those cybersecurity risks. And that brings us to cybersecurity and how it integrates into architectures.There are going to be many different types of peoplecoming from diverse backgroundsreading this book, but our intent is to focus on the second word in security architecture, which is architecture. Every architecture should have a focus on security. If you are working on a network architecture, you have to keep in mind things such as security zones and access control lists. If you are putting together an infrastructure architecture, you have to keep in mind what roles the solution will use and how you will harden the various components. And, if you are working on an application architecture, you want to be thinking about how to ensure that the application is designed and coded so that there are as few vulnerabilities in the application as possible.This book will talk about all the different things that an architect gets involved in and how security is integrated into those activities. There is a heavy slant toward thinking like a security architect, since there isnt much difference between a security architect or any other architect. They all do the same thingsthey create the same types of artifacts and they support architects in different architecture domains in the same ways. The only difference is the realm of focus.There are different areas that an architect will focus on, depending on whether they are an enterprise-level architect, a solution-level architect, or a supporting-level architect. And, with each, there are security aspects that have be considered, just as there are aspects that every architect has to think about from other non-security domains. There are governance aspects, strategy and program-level aspects, and solution-level aspects, for instance. Plus, if you are doing your job correctly, you should be interfacing with the biggest stakeholder of them allthe operations teamssince they, too, have to deal with your solution. But theyll have to deal with it long after you are gone.Enjoy this book and read it for what its worth. And, hopefully, it will provide you with a view into your own architecture domain and not just into the security architecture domain. Thank you, and we hope this book helps you.

Neil Rerup: author's other books


Who wrote Hands-On Cybersecurity for Architects? Find out the surname, the name of the author of the book and a list of all author's works by series.

Hands-On Cybersecurity for Architects — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Hands-On Cybersecurity for Architects" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Hands-On Cybersecurity for Architects
Plan and design robust security architectures
Neil Rerup
Milad Aslaner

BIRMINGHAM - MUMBAI Hands-On Cybersecurity for Architects Copyright 2018 - photo 1

BIRMINGHAM - MUMBAI
Hands-On Cybersecurity for Architects

Copyright 2018 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Commissioning Editor: Vijin Boricha
Reviewers: Diya Qudaih, Gregory Saxton, and Abhijit Mohanta
Acquisition Editor: Prateek Bharadwaj
Content Development Editor: Nithin George Varghese
Technical Editor: Prashant Chaudhari
Copy Editor: Safis Editing
Project Coordinator: Virginia Dias
Proofreader: Safis Editing
Indexer: Aishwarya Gangawane
Graphics: Tom Scaria
Production Coordinator: Shantanu Zagade

First published: July 2018

Production reference: 1280718

Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham
B3 2PB, UK.

ISBN 978-1-78883-026-3

www.packtpub.com


To my wife, Lisa, who supported me in my journey through the IT industry through the years, as frustrating as it must have been. To my oldest son, Nathan, who is a better version of myself and who has a very bright future in front of him. And to my youngest son, Connor, who has greatness within him, if he just reaches out to grab it.
Neil Rerup

This book is dedicated to my family and friends, who have always supported me
in pursuing my dreams.
Milad Aslaner
maptio Mapt is an online digital library that gives you full access to over - photo 2
mapt.io

Mapt is an online digital library that gives you full access to over 5,000 books and videos, as well as industry leading tools to help you plan your personal development and advance your career. For more information, please visit our website.

Why subscribe?
  • Spend less time learning and more time coding with practical eBooks and Videos from over 4,000 industry professionals

  • Improve your learning with Skill Plans built especially for you

  • Get a free eBook or video every month

  • Mapt is fully searchable

  • Copy and paste, print, and bookmark content

PacktPub.com

Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.PacktPub.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at service@packtpub.com for more details.

At www.PacktPub.com , you can also read a collection of free technical articles, sign up for a range of free newsletters, and receive exclusive discounts and offers on Packt books and eBooks.

Contributors
About the authors

Neil Rerup is the President and Chief Security Architect of an architecture firm that provides architectural services (enterprise and solution) to enterprises across North America. He is an enterprise architect who came out of the world of cybersecurity. He has worked on a number of projects for enterprises around the world and has worked in various architecture domains, including security, networking, and applications. He was responsible for the security architecture for the Vancouver 2010 Winter Olympics, securing the critical infrastructure of numerous utilities, and is also responsible for large enterprise solutions for companies around the world.

I'd like to acknowledge Randy Stroud, for teaching me the professionalism for security architecture; John Lilleyman, for expanding my understanding of Enterprise Architecture; and Steve Zalewski, for being a sounding board on my thoughts around enterprise security architecture.

Milad Aslaner is a mission-focused security professional with more than 11 years of international experience in product engineering; product management; and business evangelism for cybersecurity, data privacy, and enterprise mobility. He has been an award-winning speaker and technical expert at global conferences, such as Microsoft Ignite, Microsoft Tech Summit, and Microsoft Build.

I would like to express my appreciation to my mother, who shaped me into the person I am today; my siblings, Aydin and Aylin Aslaner, who motivated me to get into this industry; my soulmate, Salpie Dawood, who continuously pushes me to become a better person; my supporting friends, Dr. Erdal Ozkaya, Karam Masri, Joao Botto, Antonio Vasconcelos, and Yasin Stl; and finally, Packt Publishing, for the great partnership.
About the reviewer

Abhijit Mohanta works as a malware researcher for Juniper Threat Labs. He worked as malware researcher for Cyphort, MacAfee, and Symantec. He has expertise in reverse engineering and experience working with antivirus and sandbox technologies. He is the author of the book Preventing Ransomware: Understand, Prevent, andRemediate Ransomware Attacks, published by Packt Publishing. He has a number of blogs on malware research, and also has a couple of patents related to malware detection.

Packt is searching for authors like you

If you're interested in becoming an author for Packt, please visit authors.packtpub.com and apply today. We have worked with thousands of developers and tech professionals, just like you, to help them share their insight with the global tech community. You can make a general application, apply for a specific hot topic that we are recruiting an author for, or submit your own idea.

Table of Contents
Preface

There has been so much written over the years on the subject of security. IT security. Information security. Cybersecurity. All focused on security. But here's the problem: from a more practical point of view, security is more about quality assurance for your architectures rather than being about ensuring that risks are mitigated.

Most people forget that the core business of an enterprise is business. It's not security in any form. Securitymore specifically, cybersecurityis meant to provide a clear understanding to the business as to what the security risks are and how to potentially mitigate those cybersecurity risks. And that brings us to cybersecurity and how it integrates into architectures.

There are going to be many different types of peoplecoming from diverse backgroundsreading this book, but our intent is to focus on the second word in "security architecture", which is

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Hands-On Cybersecurity for Architects»

Look at similar books to Hands-On Cybersecurity for Architects. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Hands-On Cybersecurity for Architects»

Discussion, reviews of the book Hands-On Cybersecurity for Architects and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.