Enterprise Level Security: Securing Information Systems in an Uncertain World
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived fro
1133124356
Enterprise Level Security: Securing Information Systems in an Uncertain World
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived fro
56.99 In Stock
Enterprise Level Security: Securing Information Systems in an Uncertain World

Enterprise Level Security: Securing Information Systems in an Uncertain World

by William R. Simpson
Enterprise Level Security: Securing Information Systems in an Uncertain World

Enterprise Level Security: Securing Information Systems in an Uncertain World

by William R. Simpson

eBook

$56.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived fro

Product Details

ISBN-13: 9781040192412
Publisher: CRC Press
Publication date: 04/27/2016
Sold by: Barnes & Noble
Format: eBook
Pages: 429
File size: 23 MB
Note: This product may take a few minutes to download.

About the Author

Dr. William R. Simpson earned his bachelor of science in aerospace engineering from Virginia Polytechnic Institute and State University, a master of science and a doctor of philosophy in aeronautical and astronautical engineering from Ohio State University, and a master of science in administration from George Washington University. He has held academic positions at George Mason University, Old Dominion University, the University of Maryland, and Ohio State University. He has held industry positions at the US Naval Air Test Center, the Center for Naval Analyses, the ARINC Research Corporation, and the Institute for Defense Analyses.

Table of Contents

Introduction. BASICS AND PHILOSOPHY. Identity. Attributes. Access and Privilege. Cryptography. The Cloud. The Network. TECHNICAL DETAILS. Claims-Based Authentication. Credentials for Access Claims. Claims Creation. Invoking an Application. Cascading Authorization. Federation. Content Access Control. Delegation. The Enterprise Attribute Ecosystem. Database Access. Building Enterprise Software. Vulnerability Analyses. An Enterprise Support Desk. Network Defense. Concluding Remarks. Appendix. Bibliography.
From the B&N Reads Blog

Customer Reviews