rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780470745755

Security in a Web 2.0+ World : A Standards-Based Approach

by
  • ISBN13:

    9780470745755

  • ISBN10:

    0470745754

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2009-05-05
  • Publisher: Wiley

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $53.33 Save up to $15.33
  • Rent Book $38.00
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-4 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Security in a Web 2.0+ World : A Standards-Based Approach [ISBN: 9780470745755] for the semester, quarter, and short term or search our site for other textbooks by Solari , Carlos Curtis. Renting a textbook can save you up to 90% from the cost of buying.

Summary

Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust.Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know how to make effective security policy decisions to engineers who design ICT systems - a guide to information security and standards in the Web 2.0+ era. It provides an understanding of IT security in the converged world of communications technology based on the Internet Protocol.Many companies are currently applying security models following legacy policies or ad-hoc solutions. A series of new security standards (ISO/ITU) allow security professionals to talk a common language. By applying a common standard, security vendors are able to create products and services that meet the challenging security demands of technology further diffused from the central control of the local area network. Companies are able to prove and show the level of maturity of their security solutions based on their proven compliance of the recommendations defined by the standard.Carlos Solari and his team present much needed information and a broader view on why and how to use and deploy standards. They set the stage for a standards-based approach to design in security, driven by various factors that include securing complex information-communications systems, the need to drive security in product development, the need to better apply security funds to get a better return on investment.Security applied after complex systems are deployed is at best a patchwork fix. Concerned with what can be done now using the technologies and methods at our disposal, the authors set in place the idea that security can be designed in to the complex networks that exist now and for those in the near future. Web 2.0 is the next great promise of ICT - we still have the chance to design in a more secure path.Time is of the essence - prevent-detect-respond!

Author Biography

Carlos Curtis Solari (lead author) is VP, Security Strategy and Solutions, Alcatel-Lucent. Carlos joined Alcatel-Lucent as Bell Labs Security Solutions Vice President in April 2006. In this role, Carlos heads a team defining and implementing the security strategy positioning Alcatel-Lucent as the vendor of choice for secure, reliable networks, services and applications. Carlos has extensive experience in the field of information systems security as applied in the areas of homeland security, law enforcement, public safety and defence; with over 25 years in various government and private industry positions, including more than 6 years as a senior executive with the Federal Bureau of Investigation. From 2002 to 2005 he served as Chief Information Officer for the Executive Office of the President - the White House.

Table of Contents

Forewordp. xi
Prologuep. xv
The World of Cyber Security in 2019p. 1
The Costs and Impact of Cyber Securityp. 15
Protecting Web 2.0: What Makes it so Challenging?p. 39
Limitations of the Present Modelsp. 63
Defining the Solution - ITU-T X.805 Standard Explainedp. 79
Building the Security Foundation Using the ITU-T X.805 Standard: The ITU-T X.805 Standard Made Operationalp. 101
The Benefits of a Security Framework Approachp. 113
Correcting Our Path-What Will it Take?p. 137
Appendix Ap. 151
Appendix Bp. 181
Appendix Cp. 207
Glossaryp. 217
Indexp. 229
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program