Buy Used
Used: Very Good | Details
Sold by Orion LLC
Condition: Used: Very Good
Comment: Book is lightly used with little or no noticeable damage. .
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Security Architecture: Design, Deployment and Operations Paperback – July 30, 2001

4 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price New from Used from
"Please retry"
$24.75 $0.01

Amazon Educational Video Store
Amazon Educational Video Store
From Adobe to Microsoft and web design to photography, learn new skills in the Amazon's Educational Video Store. Explore More.

Editorial Reviews

From the Back Cover

Apply the latest security technology to real-world corporate and external applications

Design a secure solution from start to finish and learn the principles needed for developing solid network architecture using this authoritative guide. You'll find hands-on coverage for deploying a wide range of solutions, including network partitioning, platform hardening, application security and more. Get details on common security practices, standards, and guidelines and learn proven implementation techniques from case studies discussed in each chapter. Written by recognized experts and endorsed by RSA Security Inc., the most trusted name in e-security, this comprehensive and practical security guide is your essential tool for planning and implementing a safe and reliable enterprise network.

This book will show you how to:

  • Develop an information classification and access control plan
  • Use the appropriate security policies and technology to best meet your security requirements
  • Comprehend security infrastructure design principles
  • Utilize appropriate security technology in the most secure method
  • Fully understand the tradeoffs between usability and liability
  • Ensure complete network security across multiple systems, applications, hosts, and devices
  • Develop and apply policies, assess risks, and understand requirements for running security-specific technology
  • Work with and configure IDS, VPN, PKI, and firewalls

About the Author

Christopher King CISSP (Andover, MA) (Certified Information Systems Security Professional) is the Managing Principal of Greenwich Technology Partners. He has over 15 years of experience with various corporations such as Bell Atlantic, McGraw-Hill and Fidelity Investments as an Information Security consultant. Prior to joining Greenwich Technology Partners he served as a Cryptographic Engineer with The National Security Agency. He's a regular contributor to Information Security Magazine, Business Communication Review and Computer Security Review. Curtis Dalton (Georgetown, MA) CISSP, CCIE is a Consulting Engineer with Greenwich Technology Partners. He has over 12 years experience with companies such as Siemens Information and Communications Networks, Boston Technology Corp and Xerox designing and deploying large-scale network solutions in industries ranging from finance to telecommunications, manufacturing, and R&D. Ertam Osmanoglu (Malden, MA) is a Security Engineer with Greenwich Technology Partners. He has over over 5 years experience providing systems and security consulting and support services for Ernst and Young.

Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Series: RSA Press
  • Paperback: 481 pages
  • Publisher: Osborne/McGraw-Hill; 1st edition (July 30, 2001)
  • Language: English
  • ISBN-10: 0072133856
  • ISBN-13: 978-0072133851
  • Product Dimensions: 9.2 x 7.4 x 1.4 inches
  • Shipping Weight: 2.3 pounds
  • Average Customer Review: 3.8 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #1,505,492 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

10 of 13 people found the following review helpful By Ben Rothke on October 26, 2001
Format: Paperback
Boeing Aircraft is currently working on its next big airplane, the Sonic Cruiser. But even before a prototype of the Sonic Cruiser takes to the skies, tens of thousands of hours will have been spent on design, planning, testing, legal, administrative, and other tasks.
The product development scenario for information technology and information security is radically different. Corporate networks are being rolled out with planning and design that is not on par with that of our counterparts in the aviation and construction industries. In fact, already complex corporate networks are continuously becoming more byzantine. Take an average MIS department and add up all their hardware vendors, network topologies and protocols, operating systems, software add-ons, and custom-written applications. Now try to securely integrate them. If security was not designed into the original system architecture, how can these security products be expected to work? Despite the fact that companies are spending more and more money on information systems security, the systems are growing more and more complex -- and complex systems are much harder to protect.
Security Architecture: Design, Deployment and Operations, is intended to help readers design and deploy better security technologies. The authors believe that security architecture must be comprehensive, because a network that is 98% secure is actually 100% insecure. This is especially true, given that -- contrary to popular belief -- information security is not a pure science, but a mixture of art and science.
Effective information security must encompass every aspect of the enterprise. Security Architecture shows how to design a secure infrastructure. It addresses all of the major security products and provides details on how to deploy them.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
10 of 13 people found the following review helpful By "dougjames1" on August 21, 2001
Format: Paperback
While this book didn't light a raging intellectual fire within my gray matter it certainly was a well-crafted and thorough explanation of various security techniques. And although I found some of the chapters a bit bloated and at times confusing the price of the volume was completely justified on the basis of Chapter 12 alone. "PKI: Components and Applications" was by far the most clear and concise treatise I have ever encountered during my months of research covering PKI -- a challenging and almost arcane security method. With envious ease the author managed to delineate complicated and intricate methodolgies using a common-sense approach that's a pleasurable derivation from standard computer book narrative.
If you are interested in learning about PKI I suggest no better a place to start or end than "Security Architecture: Design, Deployment and Operations".
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 11 people found the following review helpful By Ivo on January 16, 2002
Format: Paperback
The first 5 chapters are really about Security Architecture. The rest of the book has a more technical angle. The author totally, in my view, gets lost in words like: Requirements, Services and Controls. He uses these words sometimes at random. Since these definitions are crucial to a good and understandable built-up of any ICT architecture, the reader might get lost.
Under design guidelines he talks about the services offered by the a team: Authentication, Authorizaton...etc. etc. Part of those services are Logical Access Controls which he calls "these controls". Under Technical Security Requirements we focus on controls that....The main focus of technical security controls is to protect C.A.I, which are at the same time technical security requirements. At the same time: Controls are designed to gover the following actions: again we find confidentiality, integrity..etc.
All are requirements, actions, controls and services. Not clear enough in my opinion.
The technical part is good.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
it is wonderfull book. Specialy my proferssor asked us to write a report from student organization.

my bigger boss, gave me all IT architecture for our own org.

I understand the new tech in our org. more. It is still in my menory .
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

What Other Items Do Customers Buy After Viewing This Item?