Skip to main content
Taylor & Francis Group Logo
Advanced Search

Click here to search books using title name,author name and keywords.

  • Login
  • Hi, User  
    • Your Account
    • Logout
Advanced Search

Click here to search books using title name,author name and keywords.

Breadcrumbs Section. Click here to navigate to respective pages.

Book

Enterprise Security Architecture

Book

Enterprise Security Architecture

DOI link for Enterprise Security Architecture

Enterprise Security Architecture book

A Business-Driven Approach

Enterprise Security Architecture

DOI link for Enterprise Security Architecture

Enterprise Security Architecture book

A Business-Driven Approach
ByNicholas Sherwood
Edition 1st Edition
First Published 2005
eBook Published 26 November 2014
Pub. Location Boca Raton
Imprint CRC Press
DOI https://doi.org/10.1201/b17776
Pages 608
eBook ISBN 9780429181320
Subjects Computer Science
Share
Share

Get Citation

Sherwood, N. (2005). Enterprise Security Architecture: A Business-Driven Approach (1st ed.). CRC Press. https://doi.org/10.1201/b17776

ABSTRACT

Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it requires a framework for developing and maintaining a system that is proactive. The book is based

TABLE OF CONTENTS

Foreword xv
Preface xvii

Acknowledgements
Part 1: Introduction

Chapter 1: The Meaning of Security

Chapter 2: The Meaning of Architecture

Chapter 3: Security Architecture Model

Chapter 4: Case Study

Chapter 5: A Systems Approach

Chapter 6: Measuring Return on Investment in Security Architecture

Chapter 7: Using This Book as a Practical Guide

Chapter 8: Managing the Security Architecture Programme

Part 2: Strategy and Planning

Chapter 9: Contextual Security Architecture

Chapter 10: Conceptual Security Architecture

Part 3: Design

Chapter 11: Logical Security Architecture

Chapter 12: Physical Security Architecture

Chapter 13: Component Security Architecture

Chapter 14: Security Policy Management

Chapter 15: Operational Risk Management

Chapter 16: Assurance Management

Chapter 17: Security Administration and Operations

Appendix A: List of Acronyms 561
Index


 

T&F logoTaylor & Francis Group logo
  • Policies
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
  • Journals
    • Taylor & Francis Online
    • CogentOA
    • Taylor & Francis Online
    • CogentOA
  • Corporate
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
  • Help & Contact
    • Students/Researchers
    • Librarians/Institutions
    • Students/Researchers
    • Librarians/Institutions
  • Connect with us

Connect with us

Registered in England & Wales No. 3099067
5 Howick Place | London | SW1P 1WG © 2021 Informa UK Limited