logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

일간
|
주간
|
월간

실시간 검색어

검색가능 서점

도서목록 제공

Distributed Systems Security: Issues, Processes and Solutions

Distributed Systems Security: Issues, Processes and Solutions (Hardcover)

Anirban Chakrabarti, Abhijit Belapurkar (지은이)
John Wiley & Sons Inc
189,660원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
155,520원 -18% 0원
7,780원
147,740원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Distributed Systems Security: Issues, Processes and Solutions
eBook 미리보기

책 정보

· 제목 : Distributed Systems Security: Issues, Processes and Solutions (Hardcover) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9780470519882
· 쪽수 : 328쪽
· 출판일 : 2009-04-01

목차

Chapter 1: Introduction

1.1 Background

1.2 Distributed Systems.

1.3 Distributed Systems Security.

1.4 About the Book.

 

Chapter 2: Security Engineering.

2.1 Introduction.

2.2 Secure Development Life Cycle Processes – An Overview.

2.3 A Typical Security Engineering Process.

2.4 Important Security Engineering Guidelines and Resources.

2.5 Conclusion.

 

Chapter 3. Common Security Issues and Technologies.

3.1 Security Issues.

3.2 Common Security Techniques.

3.3 Summary.

 

Chapter 4 – Host level Threats and Vulnerabilities.

4.1 Background.

4.2 Malware.

4.3 Eavesdropping.

4.4 Job faults.

4.5 Resource starvation.

4.6 Overflow.

4.7 Privilege escalation.

4.8 Injection attacks.

4.9 Conclusion.

 

Chapter 5 – Infrastructure Level Threats & Vulnerabilities.

5.1 Introduction.

5.2 Network Level Threats and Vulnerabilities.

5.3 Grid Computing Threats and Vulnerabilities.

5.4 Storage Threats and Vulnerabilities.

 

Chapter 6: Application Level Vulnerabilities and Attacks.

6.1 Introduction.

6.2 Application Layer Vulnerabilities.

6.3 Conclusion.

 

Chapter 7 – Service Level Issues, Threats and Vulnerabilities.

7.1 Introduction.

7.2 SOA and Role of Standards.

7.3 Service Level Security Requirements.

7.4 Service Level Threats and Vulnerabilities.

7.5 Service Level Attacks.

7.6 Services Threat Profile.

7.7 Conclusions.

 

Chapter 8: Host level Solutions.

8.1 Background.

8.2 Sandboxing.

8.3 Virtualization.

8.4 Resource Management

8.5 Proof carrying code.

8.6 Memory firewall

8.7 Anti malware.

8.8 Conclusions.

 

Chapter 9 – Infrastructure Level Solutions

9.1 Introduction.

9.2 Network Level Solutions.

9.3 Grid Level Solutions.

9.4 Storage Level Solutions.

 

Chapter 10: Application Level Solutions.

10.1 Introduction.

10.2 Application Level Security Solutions.

10.3 Conclusion.

 

Chapter 11 – Service Level Solutions.

11.1 Introduction.

11.2 Services Security Policy.

11.3 SOA Security standards stack.

11.4 Standards in Depth.

11.5 Deployment Architectures for SOA Security.

11.6 Managing Service Level Threats.

11.7 Service Threat Solution Mapping.

11.8 XML Firewall Configuration-Threat Mapping.

11.9 Conclusions.

 

Chapter 12 - Case Study – Compliance in Financial Services.

12.1 Introduction.

12.2 SOX compliance.

12.3 SOX Security Solutions.

12.4 Multi-level policy driven solution architecture.

12.5 Conclusions.

 

Chapter 13 – Case Study of Grid.

13.1 Background.

13.2 Financial Application.

13.3 Security Requirements Analysis.

13.4 Final Security Architecture.

 

Chapter 14: Future directions and Conclusions.

14.1 Future directions.

14.2 Conclusions.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책