買這商品的人也買了...
-
Fundamentals of Data Structures in C$1,050$1,029 -
Introduction to Algorithms, 2/e (Hardcover)$990$970 -
Assembly Language for Intel-Based Computers, 4/e (平裝版)$960$941 -
資料庫系統之理論與實務$680$646 -
資料探礦概念與技術(Data Mining: Concepts and Techniques)$800$720 -
ASP.NET 徹底研究進階技巧─高階技巧與控制項實作$650$507 -
計算機組織與設計 (Computer Organization and Design: The Hardware/Software Interface, 3/e)$680$646 -
新一代 ASP.NET 2.0 網站開發實戰-使用C# 以及 VB$550$468 -
深入淺出 Java 程式設計, 2/e (Head First Java, 2/e)$880$695 -
Flash 8 躍動的網頁中文版$550$434 -
CSS 功能索引式參考手冊$390$308 -
正確學會 Photoshop CS2 的 16 堂課$580$458 -
軟體預先架構之美學 (Prefactoring)$580$458 -
SQL Server 2005 資料庫開發聖經$890$757 -
作業系統原理 (Silberschatz: Operating System Principles, 7/e)$780$741 -
駭客與畫家-電腦世紀的大觀念 (Hackers and Painters: Big Ideas from the Computer Age)$300$237 -
Oracle 資料庫達人經驗分享實務講座$490$382 -
$199Communication Skills Handbook (Paperback) -
軟體超人 X 光眼─專案開發揭弊大爆料$260$205 -
Spring 技術手冊$580$458 -
鳥哥的 Linux 私房菜基礎學習篇, 2/e$780$663 -
ASP.NET 2.0 深度剖析範例集$650$507 -
聖殿祭司的 ASP.NET 2.0 專家技術手冊─使用 C#$720$568 -
Windows Mobile 平台應用與開發$520$199 -
Microsoft Office 2010 非常 Easy$520$410
資訊安全書展|中文簡體2書75折 英文2書85折 詳見活動內容 »
-
VIP 95折
Quantum Ready: The Enterprise Guide to Post-Quantum Cryptographic Readiness (Paperback)$2,550$2,422 -
VIP 95折
Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility$1,900$1,805 -
85折
$1,785Certificate of Cloud Security Knowledge (Ccsk V5) Study Guide: In-Depth Guidance and Practice -
VIP 95折
Data-Driven Cybersecurity: Reducing Risk with Proven Metrics$2,160$2,052 -
VIP 95折
Palo Alto Networks from Policy to Code: Automate PAN-OS security policies with Python precision (Paperback)$1,690$1,605 -
85折
$1,573Microsoft Security Copilot: Master strategies for AI-driven cyber defense -
VIP 90折
Intelligent Continuous Security: Ai-Enabled Transformation for Seamless Protection (Paperback)$2,565$2,430 -
Privileged Access Management: Strategies for Zero Trust in the Enterprise$1,860$1,822 -
VIP 90折
Identity Security for Software Development: Best Practices That Every Developer Must Know (Paperback)$1,995$1,890 -
VIP 95折
Mastering Palo Alto Networks : The complete journey to firewall mastery from setup to advanced security, 3/e (Paperback)$1,850$1,757 -
VIP 95折
電腦安全:原理與實踐(原書第5版)*此書為英文原文書*$774$735 -
CISSP Study Guide 2025-2026: All in One CISSP Exam Prep for the ICS2 Certified Information Systems Security Professional Certification. With Exam Review Material & 774 CISSP Practice Test Questions (Paperback)$1,800$1,764 -
VIP 95折
IAPP CIPP / US Certified Information Privacy Professional Study Guide (Sybex Study Guide)$2,080$1,976 -
85折
$1,530Microsoft Cybersecurity Architect Exam Ref SC-100 - Second Edition: Ace the SC-100 exam and develop cutting-edge cybersecurity strategies -
Cryptography (Paperback)$850$833 -
VIP 95折
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption$2,100$1,995 -
VIP 95折
Open-Source Security Operations Center (Soc): A Complete Guide to Establishing, Managing, and Maintaining a Modern Soc (美國原版)$3,300$3,135 -
85折
$3,383A Comprehensive Guide to the Nist Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice -
85折
$1,785Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles (Paperback) -
VIP 95折
Cryptography Algorithms - Second Edition: Get to grips with new algorithms in blockchain, zero-knowledge, homomorphic encryption, and quantum$1,840$1,748 -
VIP 90折
Hands-On Differential Privacy: Introduction to the Theory and Practice Using Opendp$2,517$2,385 -
85折
$2,678Developing Cybersecurity Programs and Policies in an Ai-Driven World -
VIP 95折
Implementing Palo Alto Networks Prisma(R) Access: Learn real-world network protection (Paperback)$1,990$1,890 -
VIP 95折
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (Hardcover) 2/e$2,800$2,660 -
85折
$1,530Microsoft 365 Security and Compliance for Administrators: A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
商品描述
Description:
Security is too important to be left in the hands of one systems architect or department -- it is the concern of every enterprise. Having a comprehensive plan for making and keeping an enterprise secure is the responsibility of every senior manager, and requires more than the purchase of security software. Enterprise security requires a framework for developing and maintaining a proactive system to provide business assurance and enable new business opportunities.
The authors have designed a much-needed framework for developing enterprise security architecture using key theoretical models and decades of practical experience. The SABSA(r) (Sherwood Applied Business Security Architecture) model is generic and defines a process for architecture development, with each solution unique to the individual business. At the heart of this framework is Business Attribute Profiling, the key step in capturing business requirements, defining measurement approaches and setting performance targets for information system risk management. This approach, lacking for decades in the development of information systems, provides a quantum leap for the many systems architects who have been struggling to achieve this business linkage.
Both technical security personnel and business managers will find this book useful as a tutorial or reference tool. It relates security architecture issues to business requirements using charts and graphs, and includes descriptions of real business situations.
商品描述(中文翻譯)
安全性對於任何企業來說都至關重要,不能僅僅依賴一位系統架構師或某個部門來負責——這是每個企業的共同責任。制定和維護一個全面的企業安全計劃是每位高級管理者的責任,這不僅僅是購買安全軟體那麼簡單。企業安全需要一個框架來開發和維護一個主動的系統,以提供業務保障並啟用新的商業機會。
作者設計了一個急需的框架,用於開發企業安全架構,這個框架基於關鍵的理論模型和數十年的實踐經驗。SABSA(r)(Sherwood 應用商業安全架構)模型是通用的,定義了一個架構開發的過程,每個解決方案都是針對特定企業的獨特需求。在這個框架的核心是商業屬性分析(Business Attribute Profiling),這是捕捉商業需求、定義測量方法和設定資訊系統風險管理績效目標的關鍵步驟。這種方法在資訊系統的開發中缺失了數十年,為許多一直在努力實現商業聯繫的系統架構師提供了一次質的飛躍。
技術安全人員和商業管理者都會發現這本書作為教程或參考工具非常有用。它通過圖表和圖形將安全架構問題與商業需求相關聯,並包括真實商業情境的描述。
