- Shopping Bag ( 0 items )
From Barnes & NobleThe Barnes & Noble Review
When it comes to security, you need all the help you can get. This book puts the world's most powerful organization on your side: the U.S. Department of Defense.
Since 9/11, DOD has spent over $80 million to identify state-of-the-art techniques for defending networks against terrorists and other bad guys. DOD investigated a wide spectrum of new ideas from many of the field's leading researchers. Now, five years later, the project's leaders have identified the approaches that are proving most valuable. This book presents that work in language every IT professional, manager, and security specialist can understand -- and use.
It's organized into five key areas: architecting information infrastructures for security; protecting the edges of critical infrastructure; engineering software for security assurance; countering malicious mobile code; and ensuring the dependable command and control of IT infrastructure.
As an example, you'll find leading-edge work on automating the creation of role-based access control security policies. (If you've ever done it by hand, you know how welcome that'll be.) You'll also find advanced techniques for building safer large-scale services-based systems: systems that are "adaptable, situation-aware, and secure" -- and, as you move towards SOA, this, too, will be extremely valuable.
There are discussions of powerful new approaches to improving the effectiveness of network intrusion detection and host-based defenses. These include machine learning techniques capable of discovering new signatures based on known attacks, as well as more effective ways to detect zombie botnet attacks.
Some of the work discussed here is potentially usable now, or will be soon. Some of it hasn't been commercialized yet: Often, that's the next step. Put another way, reading this book takes you to the leading edge. Exactly where you need to be to stay ahead of the bad guys. Bill Camarda, from the August 2007 Read Only