HomeGroupsTalkZeitgeist
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Security Patterns: Integrating Security and…
Loading...

Security Patterns: Integrating Security and Systems Engineering (Wiley…

by Markus Schumacher

MembersReviewsPopularityAverage ratingConversations
19None533,508NoneNone
None

None.

Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

No reviews
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
First words
Quotations
Last words
Disambiguation notice
Publisher's editors
Blurbers
Publisher series

References to this work on external resources.

Wikipedia in English (1)

Book description
Haiku summary

Amazon.com Product Description (ISBN 0470858842, Hardcover)

Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security Patterns addresses the full spectrum of security in systems design, using best practice solutions to show how to integrate security in the broader engineering process. Essential for designers building large-scale systems who want best practice solutions to typical security problemsReal world case studies illustrate how to use the patterns in specific domains

For more information visit www.securitypatterns.org

(retrieved from Amazon Mon, 30 Sep 2013 13:39:46 -0400)

"In a time where systems are constantly at risk, it is essential that you arm yourself with the knowledge of different security measures. This title breaks down security at various levels of the system: the enterprise, architectural and operational layers. It acts as an extension to the larger enterprise contexts and shows you how to integrate security in the broader engineering process."--BOOK JACKET.… (more)

Quick Links

Swap Ebooks Audio
2 wanted2 pay

Popular covers

Rating

Average: No ratings.

Is this you?

Become a LibraryThing Author.

 

Help/FAQs | About | Privacy/Terms | Blog | Contact | LibraryThing.com | APIs | WikiThing | Common Knowledge | Legacy Libraries | Early Reviewers | 89,494,448 books! | Top bar: Always visible