000 02232 a2200361 4500
005 20250829160511.0
020 _a9781596932180
082 0 4 _a621
_bCOR
100 1 _aCoyne, Edward J.
_973730
245 1 0 _aRole engineering for enterprise security management
_cEdward J. Coyne.
260 _aBoston:
_bArtech House Publishers,
_c2008.
300 _axvii, 224p.
500 _aHB
520 _aWhether you are a manager, engineer, or IT security specialist, this authoritative resource shows you how to define and deploy roles for securing enterprise systems. Written by leading authorities in the field, the book explains how you can build a business case, identify risks, determine project costs, and fully plan and staff a role engineering effort. You find practical techniques that meaningfully define roles and ensure proper assignment of permissions and roles to users. The book presents tools that enable you to capture permissions and user assignments from existing systems, and analyze user and permission data in scenarios simulating actual system use. Moreover, this practical reference helps you evaluate these tools and decide which ones are right for your own role engineering program. The book also shows how to verify that role structures comply with security policies. You find tips and insights from real-world projects that guarantee you engineer roles strategically and securely.
546 _aEng
650 4 _aComputer networking & communications.
_92388
650 4 _aData security & data encryption.
_915019
650 4 _aManagement information systems.
_9504
650 4 _aTechnology & Engineering.
_973731
650 4 _aComputers - Computer Security.
_915628
650 4 _aScience/Mathematics.
_973732
650 4 _aComputers / Security / General.
_973733
650 4 _aInformation Management.
_973734
650 4 _aSecurity - General.
_973735
650 4 _aElectricity.
_973736
650 4 _aAccess control.
_957428
650 4 _aComputer network architectures.
_910967
650 4 _aComputer networks.
_973737
650 4 _aInformation resources management.
_973738
650 4 _aComputer Communications & Networking.
_973739
700 1 _aDavis, John M (jt. auth.)
_973740
942 _cBK
999 _c28160
_d28160