menu
{ "item_title" : "Cybersecurity Design Principles", "item_author" : [" Richie Miller "], "item_description" : "If you want to become a Cybersecurity Professional, this book is for youIf you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam.BUY THIS BOOK NOW AND GET STARTED TODAYIn this book you will discover:Baseline Configuration, Diagrams & IP ManagementData Sovereignty & Data Loss PreventionData Masking, Tokenization & Digital Rights ManagementGeographical Considerations & Cloud Access Security BrokerSecure Protocols, SSL Inspection & HashingAPI Gateways & Recovery SitesHoneypots, Fake Telemetry & DNS SinkholeCloud Storage and Cloud ComputingIaaS, PaaS & SaaSManaged Service Providers, Fog Computing & Edge ComputingVDI, Virtualization & ContainersMicroservices and APIsInfrastructure as Code (IAC) & Software Defined Networking (SDN)Service Integrations and Resource PoliciesEnvironments, Provisioning & DeprovisioningIntegrity Measurement & Code AnalysisSecurity Automation, Monitoring & ValidationSoftware Diversity, Elasticity & ScalabilityDirectory Services, Federation & AttestationEmbedded Systems & SCADA SecuritySmart Devices / IoT & Special Purpose DevicesHVAC, Aircraft/UAV & MFDsReal Time Operating Systems & Surveillance SystemsBarricades, Mantraps & AlarmsCameras, Video Surveillance & GuardsCable Locks, USB Data Blockers, Safes & FencingMotion Detection / Infrared & Proximity ReadersDemilitarized Zone & Protected Distribution SystemShredding, Pulping & PulverizingDeguassing, Purging & WipingCryptographic Terminology and HistoryDigital Signatures, Key Stretching & HashingQuantum Communications & Elliptic Curve CryptographyQuantum Computing, Cipher Modes & XOR FunctionEncryptions & BlockchainsAsymmetric/Lightweight Encryption & SteganographyCipher Suites, Random & Quantum Random Number GeneratorsBUY THIS BOOK NOW AND GET STARTED TODAY", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/1/83/938/182/1839381825_b.jpg", "price_data" : { "retail_price" : "25.38", "online_price" : "25.38", "our_price" : "25.38", "club_price" : "25.38", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Cybersecurity Design Principles|Richie Miller

Cybersecurity Design Principles : Building Secure Resilient Architecture

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

If you want to become a Cybersecurity Professional, this book is for you
If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam.

BUY THIS BOOK NOW AND GET STARTED TODAY

In this book you will discover:

Baseline Configuration, Diagrams & IP Management

Data Sovereignty & Data Loss Prevention

Data Masking, Tokenization & Digital Rights Management

Geographical Considerations & Cloud Access Security Broker

Secure Protocols, SSL Inspection & Hashing

API Gateways & Recovery Sites

Honeypots, Fake Telemetry & DNS Sinkhole

Cloud Storage and Cloud Computing

IaaS, PaaS & SaaS

Managed Service Providers, Fog Computing & Edge Computing

VDI, Virtualization & Containers

Microservices and APIs

Infrastructure as Code (IAC) & Software Defined Networking (SDN)

Service Integrations and Resource Policies

Environments, Provisioning & Deprovisioning

Integrity Measurement & Code Analysis

Security Automation, Monitoring & Validation

Software Diversity, Elasticity & Scalability

Directory Services, Federation & Attestation

Embedded Systems & SCADA Security

Smart Devices / IoT & Special Purpose Devices

HVAC, Aircraft/UAV & MFDs

Real Time Operating Systems & Surveillance Systems

Barricades, Mantraps & Alarms

Cameras, Video Surveillance & Guards

Cable Locks, USB Data Blockers, Safes & Fencing

Motion Detection / Infrared & Proximity Readers

Demilitarized Zone & Protected Distribution System

Shredding, Pulping & Pulverizing

Deguassing, Purging & Wiping

Cryptographic Terminology and History

Digital Signatures, Key Stretching & Hashing

Quantum Communications & Elliptic Curve Cryptography

Quantum Computing, Cipher Modes & XOR Function

Encryptions & Blockchains

Asymmetric/Lightweight Encryption & Steganography

Cipher Suites, Random & Quantum Random Number Generators


BUY THIS BOOK NOW AND GET STARTED TODAY

This item is Non-Returnable

Details

  • ISBN-13: 9781839381829
  • ISBN-10: 1839381825
  • Publisher: Pastor Publishing Ltd
  • Publish Date: January 2023
  • Dimensions: 9 x 6 x 0.45 inches
  • Shipping Weight: 0.64 pounds
  • Page Count: 212

Related Categories

You May Also Like...

    1

BAM Customer Reviews