Enterprise Architecture and Information Assurance: Developing a Secure Foundation
This book provides guidance on designing complex, highly available enterprise architectures that integrate the most critical aspects of an organization's business processes. Considering the lack of tolerance of enterprise for operational interruptions or the risks that accompany theft and loss of data, this reference describes how to ensure your organization is prepared for the unexpected. The text also aids in containing liability with guidance on network and application vulnerability assessments, intrusion detection and penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning.
1128917575
Enterprise Architecture and Information Assurance: Developing a Secure Foundation
This book provides guidance on designing complex, highly available enterprise architectures that integrate the most critical aspects of an organization's business processes. Considering the lack of tolerance of enterprise for operational interruptions or the risks that accompany theft and loss of data, this reference describes how to ensure your organization is prepared for the unexpected. The text also aids in containing liability with guidance on network and application vulnerability assessments, intrusion detection and penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning.
97.99 In Stock
Enterprise Architecture and Information Assurance: Developing a Secure Foundation

Enterprise Architecture and Information Assurance: Developing a Secure Foundation

by James A. Scholz
Enterprise Architecture and Information Assurance: Developing a Secure Foundation

Enterprise Architecture and Information Assurance: Developing a Secure Foundation

by James A. Scholz

eBook

$97.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

This book provides guidance on designing complex, highly available enterprise architectures that integrate the most critical aspects of an organization's business processes. Considering the lack of tolerance of enterprise for operational interruptions or the risks that accompany theft and loss of data, this reference describes how to ensure your organization is prepared for the unexpected. The text also aids in containing liability with guidance on network and application vulnerability assessments, intrusion detection and penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning.

Product Details

ISBN-13: 9781040059661
Publisher: CRC Press
Publication date: 07/29/2013
Sold by: Barnes & Noble
Format: eBook
Pages: 266
File size: 1 MB

About the Author

James A. Scholz is a veteran who served 20 years in the US Army. As a soldier he served as an explosive ordnance disposal technician for 17 years (10 years stationed at Fort Leonard Wood, Missouri) and part of his responsibilities were to ensure the security of Presidents, Vice-Presidents, and Foreign Dignitaries as they traveled throughout the Nation and abroad. James was awarded the Bronze Star for Valor, a Bronze Star, multiple Meritorious Service Medals, and the South West Asia Campaign Medal.

James served as the single responsible person for a 1.8 million dollar budget and as a Class "A" Agent for the US Army, overseas. James served as a Reserve Deputy Sheriff and a Crime Scene Technician with the El Paso County Sheriff's Department, Texas from 1993 through 1996. James is President and CEO of a small, service disabled veteran -owned small business that provides disaster recovery, business continuity, physical, and logical security services to federal agencies. James has 31 years experience working with the federal government at all levels and has supported many rural towns in Missouri during his career as an explosive ordnance disposal technician.

Table of Contents

Setting the Foundation. Building the Enterprise Infrastructure. Infrastructure Security Model Components. Systems Security Categorization. Business Impact Analysis. Risk. Secure Configuration Management. Contingency Planning. Cloud Computing. Continuous Monitoring. Physical Security. Building Security. The Certification and Accreditation Process.
From the B&N Reads Blog

Customer Reviews