Security Patterns in Practice: Designing Secure Architect... und über 1,5 Millionen weitere Bücher verfügbar für Amazon Kindle. Erfahren Sie mehr
EUR 54,15
  • Statt: EUR 54,16
  • Sie sparen: EUR 0,01
  • Alle Preisangaben inkl. MwSt.
Nur noch 3 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon.
Geschenkverpackung verfügbar.
Security Patterns in Prac... ist in Ihrem Einkaufwagen hinzugefügt worden
Ihren Artikel jetzt
eintauschen und
EUR 12,75 Gutschein erhalten.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Anhören Wird wiedergegeben... Angehalten   Sie hören eine Probe der Audible-Audioausgabe.
Weitere Informationen
Dieses Bild anzeigen

Security Patterns in Practice: Designing Secure Architectures Using Software Patterns (Wiley Series in Software Design Patterns) (Englisch) Gebundene Ausgabe – 19. April 2013

Alle 2 Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Amazon-Preis Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
Gebundene Ausgabe
"Bitte wiederholen"
EUR 54,15
EUR 42,10 EUR 53,95
69 neu ab EUR 42,10 5 gebraucht ab EUR 53,95

Hinweise und Aktionen

  • Sparpaket: 3 Hörbücher für 33 EUR: Entdecken Sie unsere vielseitige Auswahl an reduzierten Hörbüchern und erhalten Sie 3 Hörbücher Ihrer Wahl für 33 EUR. Klicken Sie hier, um direkt zur Aktion zu gelangen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr



Everything you need to build sophisticated security controls into every phase of your software lifecycle
In today's world of mobile networking and remote sensing, cloud computing and web interfacing, applications and the networks they run on have never been more complex. Nor have they ever been more vulnerable to attack.
Despite the vast amounts spent each year on system security, the number and scope of attacks on websites and databases worldwide continues to escalate.
Clearly, what's needed is a more systematic approach to security that the piecemeal methodology followed since the early 1990s--a holistic, case-based approach based on best practices and proven solutions to the full array of modern security threats.
Written by one of the world's leading experts on the subject, Security Patterns in Practice supplies you with just such approach.
With the help of numerous, real-world case studies, author Eduardo B. Fernandez show you how to incorporate security into every phase of the software lifecycle--from concept to design to implementation and reengineering--using security patterns.
Dr. E. B. Fernandez also supplies you with a vast catalog of up-to-date security patterns--along with detailed implementation advice and descriptions in UML--covering the full range of modern security issues, including:
* Identity management
* Access control
* Network security and web services security
* Cloud computing security
* Authentication
* Process management
* Web services cryptography
* Building secure architecture
Security Patterns in Practice arms you with everything you need to confidently develop or reengineer the most secure applications possible, without having to become a security expert.


Es gibt noch keine Kundenrezensionen auf
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne

Die hilfreichsten Kundenrezensionen auf (beta) 1 Rezension
4 von 5 Kunden fanden die folgende Rezension hilfreich
A Really Excellent View into Security Patterns for the Security Architect You Want To Become 12. Juni 2013
Von Zzyzx Oh - Veröffentlicht auf
Format: Gebundene Ausgabe Verifizierter Kauf
Many of the security architecture and patterns books are from seven or more years ago, and I purchased this hardback text because of its description and recent publication date. I am very pleased with the contents.

The first section of about thirty (30) pages in the basic introduction to the concept of Security Patterns as abstracts or templates that could be useful throught the software development or product integration lifecycle. It is general enough to be easily understood and a fairly easy read.

From the first section, I skipped to the third section, a sixty (60) page coverage of how to apply the patterns. I chose to cover this second becase 400 pages of patterns was rather intimidating. But in reading this section, I had a stronger interest in the patterns themselves. So, I dove into section two.

The patterns themselves begin in typical fasion: Identity Management, Authentication, and so on. But I found it very interedting to see how clear Circle of Trust and related patterns provide high-level descriptions of whatba Data Aggregator might be all about and how that really benefits the client. And the description of the associated Threats was outstanding. As I read through the various chapters on patterns, things wandered off the traditional a bit, finally reaching Everythin-as-a-Service-land, but even that was a valuable read. The depiction of force-dot-com as a PaaS was the first high-level review of that approach I've seen.

There are so many external references that, at first, I was checking to see if there was an included disc. But many of the references are web-searchable for further details. Some patterns are low-level and some are high-level, so some, like Application Firewall, clarify the capabilities you find in emerging products.

I highly recommend this book, and am very glad to see this in hardback format - a sign it is intended to endure, and it will.
Ist diese Rezension hilfreich? Wir wollen von Ihnen hören.