Buy Used
$14.00
FREE Shipping on orders over $35.
Used: Like New | Details
Sold by michaeldynes
Condition: Used: Like New
Comment: As good as new. Purchase with confidence from a single-person operation with professional, individualized service, where accurate descriptions and in stock items are the norm, not the exception, as my feedback indicates.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Security Architecture: Design, Deployment and Operations Paperback – July 30, 2001


Amazon Price New from Used from
Paperback
"Please retry"
$20.70 $0.01
Amazon%20Web%20Services


NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Series: RSA Press
  • Paperback: 481 pages
  • Publisher: Osborne/McGraw-Hill; 1st edition (July 30, 2001)
  • Language: English
  • ISBN-10: 0072133856
  • ISBN-13: 978-0072133851
  • Product Dimensions: 9.2 x 7.4 x 1.4 inches
  • Shipping Weight: 2.3 pounds
  • Average Customer Review: 3.8 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #1,781,974 in Books (See Top 100 in Books)

Editorial Reviews

From the Back Cover

Apply the latest security technology to real-world corporate and external applications

Design a secure solution from start to finish and learn the principles needed for developing solid network architecture using this authoritative guide. You'll find hands-on coverage for deploying a wide range of solutions, including network partitioning, platform hardening, application security and more. Get details on common security practices, standards, and guidelines and learn proven implementation techniques from case studies discussed in each chapter. Written by recognized experts and endorsed by RSA Security Inc., the most trusted name in e-security, this comprehensive and practical security guide is your essential tool for planning and implementing a safe and reliable enterprise network.

This book will show you how to:

  • Develop an information classification and access control plan
  • Use the appropriate security policies and technology to best meet your security requirements
  • Comprehend security infrastructure design principles
  • Utilize appropriate security technology in the most secure method
  • Fully understand the tradeoffs between usability and liability
  • Ensure complete network security across multiple systems, applications, hosts, and devices
  • Develop and apply policies, assess risks, and understand requirements for running security-specific technology
  • Work with and configure IDS, VPN, PKI, and firewalls

About the Author

Christopher King CISSP (Andover, MA) (Certified Information Systems Security Professional) is the Managing Principal of Greenwich Technology Partners. He has over 15 years of experience with various corporations such as Bell Atlantic, McGraw-Hill and Fidelity Investments as an Information Security consultant. Prior to joining Greenwich Technology Partners he served as a Cryptographic Engineer with The National Security Agency. He's a regular contributor to Information Security Magazine, Business Communication Review and Computer Security Review. Curtis Dalton (Georgetown, MA) CISSP, CCIE is a Consulting Engineer with Greenwich Technology Partners. He has over 12 years experience with companies such as Siemens Information and Communications Networks, Boston Technology Corp and Xerox designing and deploying large-scale network solutions in industries ranging from finance to telecommunications, manufacturing, and R&D. Ertam Osmanoglu (Malden, MA) is a Security Engineer with Greenwich Technology Partners. He has over over 5 years experience providing systems and security consulting and support services for Ernst and Young.

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

3.8 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

10 of 13 people found the following review helpful By Ben Rothke on October 26, 2001
Format: Paperback
Boeing Aircraft is currently working on its next big airplane, the Sonic Cruiser. But even before a prototype of the Sonic Cruiser takes to the skies, tens of thousands of hours will have been spent on design, planning, testing, legal, administrative, and other tasks.
The product development scenario for information technology and information security is radically different. Corporate networks are being rolled out with planning and design that is not on par with that of our counterparts in the aviation and construction industries. In fact, already complex corporate networks are continuously becoming more byzantine. Take an average MIS department and add up all their hardware vendors, network topologies and protocols, operating systems, software add-ons, and custom-written applications. Now try to securely integrate them. If security was not designed into the original system architecture, how can these security products be expected to work? Despite the fact that companies are spending more and more money on information systems security, the systems are growing more and more complex -- and complex systems are much harder to protect.
Security Architecture: Design, Deployment and Operations, is intended to help readers design and deploy better security technologies. The authors believe that security architecture must be comprehensive, because a network that is 98% secure is actually 100% insecure. This is especially true, given that -- contrary to popular belief -- information security is not a pure science, but a mixture of art and science.
Effective information security must encompass every aspect of the enterprise. Security Architecture shows how to design a secure infrastructure. It addresses all of the major security products and provides details on how to deploy them.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
10 of 13 people found the following review helpful By "dougjames1" on August 21, 2001
Format: Paperback
While this book didn't light a raging intellectual fire within my gray matter it certainly was a well-crafted and thorough explanation of various security techniques. And although I found some of the chapters a bit bloated and at times confusing the price of the volume was completely justified on the basis of Chapter 12 alone. "PKI: Components and Applications" was by far the most clear and concise treatise I have ever encountered during my months of research covering PKI -- a challenging and almost arcane security method. With envious ease the author managed to delineate complicated and intricate methodolgies using a common-sense approach that's a pleasurable derivation from standard computer book narrative.
If you are interested in learning about PKI I suggest no better a place to start or end than "Security Architecture: Design, Deployment and Operations".
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 11 people found the following review helpful By Ivo on January 16, 2002
Format: Paperback
The first 5 chapters are really about Security Architecture. The rest of the book has a more technical angle. The author totally, in my view, gets lost in words like: Requirements, Services and Controls. He uses these words sometimes at random. Since these definitions are crucial to a good and understandable built-up of any ICT architecture, the reader might get lost.
Under design guidelines he talks about the services offered by the a team: Authentication, Authorizaton...etc. etc. Part of those services are Logical Access Controls which he calls "these controls". Under Technical Security Requirements we focus on controls that....The main focus of technical security controls is to protect C.A.I, which are at the same time technical security requirements. At the same time: Controls are designed to gover the following actions: again we find confidentiality, integrity..etc.
All are requirements, actions, controls and services. Not clear enough in my opinion.
The technical part is good.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
it is wonderfull book. Specialy my proferssor asked us to write a report from student organization.

my bigger boss, gave me all IT architecture for our own org.

I understand the new tech in our org. more. It is still in my menory .
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

What Other Items Do Customers Buy After Viewing This Item?