Used price: $0.50
Buy one from zShops for: $2.96
Used price: $52.93
Buy one from zShops for: $53.66
This book is that plan: risk formulas, the nature of the threats, key tenets of a security program, key steps in constructing one, important policies to have, key steps in formulating a policy, key goals in information security, kinds of architecture to consider, kinds of infrastructure that underlie the program, steps in the life cycle for developing a secure system.
Talk about comprehensive. A great way to introduce yourself to security from a high level view or to start building security for your organization.
Lots of organizations are clueless about what is needed to set up an effective defense against hackers. This book provides the clues, in a clear, jargon-free, and easy-to-understand manner. It lays it all out step by step.
It sketches the nature of the threat hackers pose. Then it tells you, phase by phase, how to put together a security program. It lays out a so-called Policy Framework on which to hang you secure password policy, incident response policy, asset management, vulnerability assessment policy, you name it, along with the technical procedures - tightening up UNIX, getting software patches for Windows XP, etc. - that flesh out the policies. A formula for figuring out risk is offered. There's lots of useful stuff on how computer architecture fits in with security, and how life cycle development should incorporate security into it.
There actually can be a rhyme and a reason to formulating security policies, and this book lays it out.
Used price: $0.84
Collectible price: $6.00
Buy one from zShops for: $3.86
Used price: $3.67
Collectible price: $7.51
Buy one from zShops for: $9.00