Security attribute evaluation method: a cost-benefit approach
Proceedings of the 24th International Conference on Software Engineering
A model-based aspect-oriented framework for building intrusion-aware software systems
Information and Software Technology
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Firewalls - Are they enough protection for current networks?
Information Security Tech. Report
Hi-index | 0.00 |
From the Publisher:New from the official RSA Press,this expert resource explains how to design and deploy security successfully across your enterpriseand keep unauthorized users out of your network. You'll get full coverage of VPNs and intrusion detection systems,plus real-world case studies. Apply the latest security technology to real-world corporate and external applications Design a secure solution from start to finish and learn the principles needed for developing solid network architecture using this authoritative guide. You'll find hands-on coverage for deploying a wide range of solutions,including network partitioning,platform hardening,application security and more. Get details on common security practices,standards,and guidelines and learn proven implementation techniques from case studies discussed in each chapter. Written by recognized experts and endorsed by RSA Security Inc.,the most trusted name in e-security,this comprehensive and practical security guide is your essential tool for planning and implementing a safe and reliable enterprise network. This book will show you how to: Develop an information classification and access control planUse the appropriate security policies and technology to best meet your security requirementsComprehend security infrastructure design principlesUtilize appropriate security technology in the most secure methodFully understand the tradeoffs between usability and liabilityEnsure complete network security across multiple systems,applications,hosts,and devicesDevelop and apply policies,assess risks,and understand requirements for running security-specific technologyWork with and configureIDS,VPN,PKI,and firewalls