#286933 in eBooks 2015-05-20 2015-05-20File Name: B00XKX1FK81 of 2 people found the following review helpful. A must read book for software security architecture and threat modelingBy Robert HurlbutThis is a solid entry in the list of "must read books" for software security architecture and threat modeling. Brook Schoenfield's writing is clear and concise - it is always a pleasure for me to read his writing. For a great introduction to Brook's writing, also read his chapter "Applying the SDL Framework to the Real World" in Core Software Security Core So"Brook Schoenfield has distilled a tremendous amount of practical experience and critical thinking about security architecture into a resource that should be extremely helpful to practitioners." Jack Jones, Originator of The Open Group Standard, Factor Analysis for Information Risk (FAIR) "Five stInternet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architectrsquo;s job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer systemrsquo;s existing information security posture. Detailing the time-tested practices of experienced security architects, i...
You can specify the type of files you want, for your device.Securing Systems: Applied Security Architecture and Threat Models | . A good, fresh read, highly recommended.