Enterprise Level Security 1 & 2

Author:   Kevin Foltz ,  William R. Simpson
Publisher:   Taylor & Francis Ltd
ISBN:  

9780367536121


Pages:   766
Publication Date:   20 December 2022
Format:   Mixed media product
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $90.99 Quantity:  
Add to Cart

Share |

Enterprise Level Security 1 & 2


Add your own review!

Overview

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

Full Product Details

Author:   Kevin Foltz ,  William R. Simpson
Publisher:   Taylor & Francis Ltd
Imprint:   CRC Press
Weight:   0.925kg
ISBN:  

9780367536121


ISBN 10:   0367536129
Pages:   766
Publication Date:   20 December 2022
Audience:   College/higher education ,  Professional and scholarly ,  Tertiary & Higher Education ,  Professional & Vocational
Format:   Mixed media product
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Enterprise Level Security (1): 1 Introduction SECTION I?BASICS AND PHILOSOPHY 2 Identity 3 Attributes 4 Access and Privilege 5 Cryptography 6 The Cloud 7 The Network SECTION II?TECHNICAL DETAILS 8 Claims-Based Authentication 9 Credentials for Access Claims 10 Claims Creation 11 Invoking an Application 12 Cascading Authorization 13 Federation 14 Content Access Control 15 Delegation 16 The Enterprise Attribute Ecosystem 17 Database Access 18 Building Enterprise Software 19 Vulnerability Analyses 20 An Enterprise Support Desk 21 Network Defense 22 Concluding Remarks Enterprise Level Security 2: Chapter 1. The First 16 Years. Chapter 2. A Brief Review of the Initial Book. Chapter 3. Minimal Requirements for the Advanced Topics. Chapter 4. Identity Claims in High Assurance. Chapter 5. Cloud Key Management. Chapter 6. Enhanced Assurance Needs. Chapter 7. Temporary Certificates. Chapter 8. Derived Certificates on Mobile Devices. Chapter 9. Veracity and Counter Claims. Chapter 10. Delegation of Access and Privilege. Chapter 11. Escalation of Privilege. Chapter 12. Federation. Chapter 13. Content Object Uniqueness for Forensics. Chapter 14. Homomorphic Encryption. Chapter 15. Access and Privilege in Big Data Analysis. Chapter 16. Data Mediation. Chapter 17. Mobile Ad Hoc. Chapter 18. Endpoint Device Management. Chapter 19. Endpoint Agent Architecture. Chapter 20. Ports and Protocols. Chapter 21. Asynchronous Messaging. Chapter 22. Virtual Application Data Center. Chapter 23. Managing System Changes. Chapter 24. Concluding Remarks.

Reviews

Author Information

Dr. Kevin E. Foltz, Institute for Defense Analyses, has over a decade of experience working to improve security in information systems. He has presented and published research on different aspects of enterprise security, security modeling, and high assurance systems. He also has degrees in Mathematics, Computer Science, Electrical Engineering, and Strategic Security Studies. Dr. William R. Simpson, Institute for Defense Analyses, has over two decades of experience working to improve systems security. He has degrees in Aeronautical Engineering and Business Administration, as well as undergoing military and government training. He spent many years as an expert in aeronautics before delving into the field of electronic and system testing, and he has spent the last 20 years on IT-related themes (mostly security, including processes, damage assessments of cyber intrusions, IT security standards, IT security evaluation, and IT architecture).

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List