Automotive Holiday Deals Books Holiday Gift Guide Shop Men's Cyber Monday Deals Week Learn more nav_sap_SWP_6M_fly_beacon Prime Music Sweepstakes egg_2015 All-New Amazon Fire TV Grocery Gifts for Her Amazon Gift Card Offer mithc mithc mithc  Amazon Echo Starting at $49.99 Kindle Voyage Cyber Monday Video Game Deals Shop Now bgg

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Buy Used
Condition: Used: Good
Comment: Fast Shipping - Safe and Secure Bubble Mailer!
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Security Architecture: Design, Deployment and Operations Paperback – July 30, 2001

5 customer reviews

See all 2 formats and editions Hide other formats and editions
New from Used from
"Please retry"
$37.74 $0.51

Best of 2015
This Year's Top Products Shop the Editors' picks at Amazon including Movies, Music, Games, and more. Learn more

Editorial Reviews

From the Back Cover

Apply the latest security technology to real-world corporate and external applications

Design a secure solution from start to finish and learn the principles needed for developing solid network architecture using this authoritative guide. You'll find hands-on coverage for deploying a wide range of solutions, including network partitioning, platform hardening, application security and more. Get details on common security practices, standards, and guidelines and learn proven implementation techniques from case studies discussed in each chapter. Written by recognized experts and endorsed by RSA Security Inc., the most trusted name in e-security, this comprehensive and practical security guide is your essential tool for planning and implementing a safe and reliable enterprise network.

This book will show you how to:

  • Develop an information classification and access control plan
  • Use the appropriate security policies and technology to best meet your security requirements
  • Comprehend security infrastructure design principles
  • Utilize appropriate security technology in the most secure method
  • Fully understand the tradeoffs between usability and liability
  • Ensure complete network security across multiple systems, applications, hosts, and devices
  • Develop and apply policies, assess risks, and understand requirements for running security-specific technology
  • Work with and configure IDS, VPN, PKI, and firewalls

About the Author

Christopher King CISSP (Andover, MA) (Certified Information Systems Security Professional) is the Managing Principal of Greenwich Technology Partners. He has over 15 years of experience with various corporations such as Bell Atlantic, McGraw-Hill and Fidelity Investments as an Information Security consultant. Prior to joining Greenwich Technology Partners he served as a Cryptographic Engineer with The National Security Agency. He's a regular contributor to Information Security Magazine, Business Communication Review and Computer Security Review. Curtis Dalton (Georgetown, MA) CISSP, CCIE is a Consulting Engineer with Greenwich Technology Partners. He has over 12 years experience with companies such as Siemens Information and Communications Networks, Boston Technology Corp and Xerox designing and deploying large-scale network solutions in industries ranging from finance to telecommunications, manufacturing, and R&D. Ertam Osmanoglu (Malden, MA) is a Security Engineer with Greenwich Technology Partners. He has over over 5 years experience providing systems and security consulting and support services for Ernst and Young.

Looking for the Audiobook Edition?
Tell us that you'd like this title to be produced as an audiobook, and we'll alert our colleagues at If you are the author or rights holder, let Audible help you produce the audiobook: Learn more at

Product Details

  • Series: RSA Press
  • Paperback: 481 pages
  • Publisher: Osborne/McGraw-Hill; 1st edition (July 30, 2001)
  • Language: English
  • ISBN-10: 0072133856
  • ISBN-13: 978-0072133851
  • Product Dimensions: 9.2 x 7.4 x 1.4 inches
  • Shipping Weight: 2.3 pounds
  • Average Customer Review: 4.0 out of 5 stars  See all reviews (5 customer reviews)
  • Amazon Best Sellers Rank: #1,659,048 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

10 of 13 people found the following review helpful By Ben Rothke on October 26, 2001
Format: Paperback
Boeing Aircraft is currently working on its next big airplane, the Sonic Cruiser. But even before a prototype of the Sonic Cruiser takes to the skies, tens of thousands of hours will have been spent on design, planning, testing, legal, administrative, and other tasks.
The product development scenario for information technology and information security is radically different. Corporate networks are being rolled out with planning and design that is not on par with that of our counterparts in the aviation and construction industries. In fact, already complex corporate networks are continuously becoming more byzantine. Take an average MIS department and add up all their hardware vendors, network topologies and protocols, operating systems, software add-ons, and custom-written applications. Now try to securely integrate them. If security was not designed into the original system architecture, how can these security products be expected to work? Despite the fact that companies are spending more and more money on information systems security, the systems are growing more and more complex -- and complex systems are much harder to protect.
Security Architecture: Design, Deployment and Operations, is intended to help readers design and deploy better security technologies. The authors believe that security architecture must be comprehensive, because a network that is 98% secure is actually 100% insecure. This is especially true, given that -- contrary to popular belief -- information security is not a pure science, but a mixture of art and science.
Effective information security must encompass every aspect of the enterprise. Security Architecture shows how to design a secure infrastructure. It addresses all of the major security products and provides details on how to deploy them.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
10 of 13 people found the following review helpful By A Customer on August 21, 2001
Format: Paperback
While this book didn't light a raging intellectual fire within my gray matter it certainly was a well-crafted and thorough explanation of various security techniques. And although I found some of the chapters a bit bloated and at times confusing the price of the volume was completely justified on the basis of Chapter 12 alone. "PKI: Components and Applications" was by far the most clear and concise treatise I have ever encountered during my months of research covering PKI -- a challenging and almost arcane security method. With envious ease the author managed to delineate complicated and intricate methodolgies using a common-sense approach that's a pleasurable derivation from standard computer book narrative.
If you are interested in learning about PKI I suggest no better a place to start or end than "Security Architecture: Design, Deployment and Operations".
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
8 of 11 people found the following review helpful By Ivo on January 16, 2002
Format: Paperback
The first 5 chapters are really about Security Architecture. The rest of the book has a more technical angle. The author totally, in my view, gets lost in words like: Requirements, Services and Controls. He uses these words sometimes at random. Since these definitions are crucial to a good and understandable built-up of any ICT architecture, the reader might get lost.
Under design guidelines he talks about the services offered by the a team: Authentication, Authorizaton...etc. etc. Part of those services are Logical Access Controls which he calls "these controls". Under Technical Security Requirements we focus on controls that....The main focus of technical security controls is to protect C.A.I, which are at the same time technical security requirements. At the same time: Controls are designed to gover the following actions: again we find confidentiality, integrity..etc.
All are requirements, actions, controls and services. Not clear enough in my opinion.
The technical part is good.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
it is wonderfull book. Specialy my proferssor asked us to write a report from student organization.

my bigger boss, gave me all IT architecture for our own org.

I understand the new tech in our org. more. It is still in my menory .
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
By Hani on October 17, 2015
Format: Paperback Verified Purchase
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Want to discover more products? Check out these pages to see more: security architecture, security operations