\

Security architecture for hybrid cloud : (Record no. 30330)

MARC details
000 -LEADER
fixed length control field 02806nam a22002897a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260105110908.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 260105b2024 un a|||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781098157777
040 ## - CATALOGING SOURCE
Original cataloging agency AUE
Transcribing agency AUE
Description conventions rda
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.585
Item number .B83 2024
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Buckwell, Mark
245 10 - TITLE STATEMENT
Title Security architecture for hybrid cloud :
Remainder of title a practical method for designing security using zero trust principles /
Statement of responsibility, etc. Mark Buckwell, Stefaan Van daele, and Carsten Horst.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Sebastopol :
Name of producer, publisher, distributor, manufacturer O'Reilly Media, Inc.
Date of production, publication, distribution, manufacture, or copyright notice 2024.
300 ## - PHYSICAL DESCRIPTION
Extent 450 pages.
Other physical details illustrations,
Dimensions 24 cm
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
Media type code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
Carrier type code nc
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
520 ## - SUMMARY, ETC.
Summary, etc. As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to deliver secure solutions. Regulated businesses, in particular, demand rigor in the architectural process to ensure the effectiveness of security controls and continued protection. This book provides the first comprehensive method for hybrid multicloud security, integrating proven architectural techniques to deliver a comprehensive end-to-end security method with compliance, threat modeling, and zero trust practices. This method ensures repeatability and consistency in the development of secure solution architectures. Architects will learn how to effectively identify threats and implement countermeasures through a combination of techniques, work products, and a demonstrative case study to reinforce learning. You'll examine: The importance of developing a solution architecture that integrates security for clear communication Roles that security architects perform and how the techniques relate to nonsecurity subject matter experts How security solution architecture is related to design thinking, enterprise security architecture, and engineering How architects can integrate security into a solution architecture for applications and infrastructure using a consistent end-to-end set of practices How to apply architectural thinking to the development of new security solutions About the authors Mark Buckwell is a cloud security architect at IBM with 30 years of information security experience. Carsten Horst with more than 20 years of experience in Cybersecurity is a certified security architect and Associate Partner at IBM. Stefaan Van daele has 25 years experience in Cybersecurity and is a Level 3 certified security architect at IBM.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Source of heading or term Cloud computing
General subdivision Security measures
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Daele, Stefaan van
Relator term author
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Horst, Carsten
Relator term author
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Total checkouts Full call number Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     College of Computer Information Technology (CET) MAIN MAIN College of Computer Information Technology (CET) 01/05/2026   QA76.585 .B83 2024 01/05/2026 1 01/05/2026 Books