Detalles MARC
000 -LEADER |
fixed length control field |
02251nam a2200277 i 4500 |
001 - CONTROL NUMBER |
control field |
C00087571c |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230317144912.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
211110s20202020xxua fr 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781492083122 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DO-SdBDB |
Language of cataloging |
spa |
Transcribing agency |
DO-SdBDB |
050 #0 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76 .9 .A25 |
Item number |
.B85 2020 |
245 10 - TITLE STATEMENT |
Title |
Building secure and reliable systems : |
Remainder of title |
best practices for designing, implementing, and maintaining systems / |
Statement of responsibility, etc. |
Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea, Adam Stubblefield. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Sebastopol, CA : |
Name of publisher, distributor, etc. |
O´Reilly, |
Date of publication, distribution, etc. |
2020. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxiv, 519 páginas : |
Other physical details |
ilustraciones, diagramas, gráficas a blanco y negro ; |
Dimensions |
24 cm. |
505 1# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Foreword by Royal Hansen, xix -- |
Title |
Foreword by Michael Wildpaner, xxiii -- |
-- |
Preface, xxv -- |
-- |
Pat 1. Introductory material -- |
-- |
1. The intersection of security and reliability, 3 -- |
-- |
2. Understanding adversaries, 15 -- |
-- |
Part II. Designing systems -- |
-- |
3. Case study: safe proxies, 37 -- |
-- |
4. Design tradeoffs, 43 -- |
-- |
5. Design for least privilege, 61 -- |
-- |
6. Design for understandability, 89 -- |
-- |
7. Design for a changing landscape, 121 -- |
-- |
8. Design for resilience, 143 -- |
-- |
9. Design for recovery, 183 -- |
-- |
10. Mitigating denial-of-service attacks, 217 -- |
-- |
Part III. Implementing systems -- |
-- |
II. Case study: designing, implementing, and maintaining, a publicly trusted CA., 233 -- |
-- |
12. Writing code, 243 -- |
-- |
13. Testing code, 271 -- |
-- |
14. Deploying code, 303 -- |
-- |
15. Investigating systems, 333 -- |
-- |
Part IV. Maintaining Systems -- |
-- |
16. Disaster planning, 363 -- |
-- |
17. Crisis management, 387 -- |
-- |
Recovery and aftermath, 417 -- |
-- |
Part V. Organization and Culture -- |
-- |
19. Case Study: Chrome Security Team, 445 -- |
-- |
20. Understanding roles and responsibilities, 455 -- |
-- |
21. Building a culture of security and reliability, 471 -- |
-- |
Conclusion, 497 -- |
-- |
Conclusion, 497 -- |
-- |
Appendix. A disaster risk assessment matrix, 499 -- |
-- |
Index, 501. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Seguridad en computadores. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Diseño de sistemas. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Adkins, Heather. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Beyer, Betsy. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Blankinship, Paul. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Lewandowski, Piotr. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Oprea, Ana. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Stubblefield, Adam. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Monografía - Colección General |