• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • Security Architecture Modeling: A Comprehensive Approach to Enterprise Risk Management

    Security Architecture Modeling by Minoli, Daniel;

    A Comprehensive Approach to Enterprise Risk Management

      • GET 10% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 40.50
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        19 348 Ft (18 427 Ft + 5% VAT)
      • Discount 10% (cc. 1 935 Ft off)
      • Discounted price 17 414 Ft (16 584 Ft + 5% VAT)

    19 348 Ft

    db

    Availability

    Not yet published.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Publisher Wiley–Blackwell
    • Date of Publication 28 January 2026

    • ISBN 9780470109724
    • Binding Hardback
    • No. of pages300 pages
    • Size 250x150 mm
    • Language English
    • 700

    Categories

    Short description:

    This book takes a pragmatic view of the field, with emphasis on enterprise security.   It begins with an overview of what is an architecture and why one needs an architecture–based approach to the issue of security (Chapter 1).

    More

    Long description:

    This book takes a pragmatic view of the field, with emphasis on enterprise security.  It begins with an overview of what is an architecture and why one needs an architecture–based approach to the issue of security (Chapter 1). This is followed by a description of the typical corporate networking and computing environments; Unsecured Zones, Semi–Secure Zones, Secure Zones are examined (Chapter 2.)  Existing Security Architecture Models are surveyed, leading the author to synthesize a model that is used throughout the rest of the book (Chapter 3).

    The remainder of the book looks at architectural constructs for various aspects of the IT environment that may be subject to security infractions. Chapter 4 looks at the physical/electromagnetic radiation control function.  Chapter 5 looks at perimeters defenses, specifically credential/access verification functions.  Chapter 6 examines administrative internally–connected function & privilege levels.  This is follows by a discussion of the application defenses Function (Chapter 7); OS defenses functions are covered in Chapter 8.  Finally Chapter 9 looks at data and data–at–rest Functions.


    This text book is intended for security professionals at all levels in medium–to–large size companies.  It is expected to also be useful to Enterprise Architects, vendors, auditors, and students in the IT field.

    More
    Recently viewed
    previous
    Security Architecture Modeling: A Comprehensive Approach to Enterprise Risk Management

    Handbook of Research on Modern Optimization Algorithms and Applications in Engineering and Economics

    Vasant, Pandian; Weber, Gerhard-Wilhelm; Dieu, Vo Ngoc; (ed.)

    145 577 HUF

    133 931 HUF

    20% %discount
    Security Architecture Modeling: A Comprehensive Approach to Enterprise Risk Management

    Biometric Identification Technologies Based on Modern Data Mining Methods

    Bilan, Stepan; Elhoseny, Mohamed; Hemanth, D. Jude

    51 030 HUF

    40 824 HUF

    20% %discount
    Security Architecture Modeling: A Comprehensive Approach to Enterprise Risk Management

    Spatial Modeling in GIS and R for Earth and Environmental Sciences

    Pourghasemi, Hamid Reza; Gokceoglu, Candan

    67 189 HUF

    53 752 HUF

    next