publication . Part of book or chapter of book . Thesis . 2009

Security by Design

Prabath Siriwardena;
Open Access
  • Published: 10 Aug 2009
  • Publisher: Apress
  • Country: United States
Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not used to be such a prominent issue because computers were not connected 24/7, they used dialup and did not experience the effects from connecting to multiple computers. Today ...
Persistent Identifiers
free text keywords: Linux security layers, Information Security, Linux System administrators, T1, Systems engineering, Security engineering, Computer security model, Security information and event management, Software security assurance, Cloud computing security, Computer science, Security convergence, Security pattern, Security testing
Related Organizations
Download fromView all 2 versions
Thesis . 2009
Provider: VTechWorks
Part of book or chapter of book . 2014
Provider: Crossref
Any information missing or wrong?Report an Issue