Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Cybersecurity for Architects: Plan and design robust security architectures

Buy

Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Key Features

  • Architect complex security structures using standard practices and use cases
  • Integrate security with any architecture solution
  • Implement cybersecurity architecture in various enterprises

Book Description

Solutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging security approaches.

Hands-On Cybersecurity for Architects will help you to successfully design, integrate, and implement complex security structures in any solution whilst ensuring that the solution functions as expected. To start with, you will get to grips with the fundamentals of recent cybersecurity practices, followed by acquiring and understanding your organization's requirements. You will then move on to learning how to plan and design robust security architectures, along with practical approaches to performing various security assessments. Once you have grasped all this, you will learn to design and develop key requirements, such as firewalls, virtual private networks (VPNs), wide area networks (WANs), and digital certifications. In addition to this, you will discover how to integrate upcoming security changes on Bring your own device (BYOD), cloud platforms, and the Internet of Things (IoT), among others. Finally, you will explore how to design frequent updates and upgrades for your systems as per your enterprise's needs.

By the end of this book, you will be able to architect solutions with robust security components for your infrastructure.

What you will learn

  • Understand different security architecture layers and their integration with all solutions
  • Study SWOT analysis and dig into your organization’s requirements to drive the strategy
  • Design and implement a secure email service approach
  • Monitor the age and capacity of security tools and architecture
  • Explore growth projections and architecture strategy
  • Identify trends, as well as what a security architect should take into consideration

Who this book is for

Hands-On Cybersecurity for Architects is for you if you are a security, network, or system administrator interested in taking on more complex responsibilities such as designing and implementing complex security structures. Basic understanding of network and computer security implementation will be helpful. This book is also ideal for non-security architects who want to understand how to integrate security into their solutions.

Table of Contents

  1. Security Architecture History and Overview
  2. Security Governance
  3. Reference Security Architecture
  4. Cybersecurity Architecture Strategy
  5. Program and Strategy Level Work Artifacts
  6. Security Architecture in Waterfall Projects
  7. Security Architecture Project Delivery Artifacts
  8. Architecture Design Document
  9. Security Architecture and Operations
  10. Practical Security Architecture Designs
  11. Trends in Security Architecture Technology
  12. The Future of Security Architecture
  13. Assessments
(HTML tags aren't allowed.)

Beginning Serverless Computing: Developing with Amazon Web Services, Microsoft Azure, and Google Cloud
Beginning Serverless Computing: Developing with Amazon Web Services, Microsoft Azure, and Google Cloud
Learn the basics of serverless computing and how to develop event-driven architectures with the three major cloud platforms: Amazon Web Services, Microsoft Azure, and Google Cloud. This hands-on guide dives into the foundations of serverless computing, its use cases, and how to apply it using developer tools such as Node.js, Visual...
Building Serverless Microservices in Python: A complete guide to building, testing, and deploying microservices using serverless computing on AWS
Building Serverless Microservices in Python: A complete guide to building, testing, and deploying microservices using serverless computing on AWS

A practical guide for developing end-to-end serverless microservices in Python for developers, DevOps, and architects.

Key Features

  • Create a secure, cost-effective, and scalable serverless data API
  • Use identity management and authentication for a user-specific and secure...
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices

Set up complete CI and CD pipelines for your serverless applications using DevOps principles

Key Features

  • Understand various services for designing serverless architecture
  • Build CD pipelines using various cloud providers for your serverless applications
  • ...

Design Patterns and Best Practices in Java: A comprehensive guide to building smart and reusable code in Java
Design Patterns and Best Practices in Java: A comprehensive guide to building smart and reusable code in Java

Create various design patterns to master the art of solving problems using Java

Key Features

  • This book demonstrates the shift from OOP to functional programming and covers reactive and functional patterns in a clear and step-by-step manner
  • All the design patterns come...
Mastering Python Networking: Your one-stop solution to using Python for network automation, DevOps, and Test-Driven Development, 2nd Edition
Mastering Python Networking: Your one-stop solution to using Python for network automation, DevOps, and Test-Driven Development, 2nd Edition

Master the art of using Python for a diverse range of network engineering tasks

Key Features

  • Explore the power of Python libraries to tackle difficult network problems efficiently and effectively
  • Use Python for network device automation, DevOps, and software-defined...
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy