Rating: Summary: An excellent book for non-technical and technical readers Review: "Access Denied" is an excellent book for readers that want to understand the big picture of computer security. Network weaknesses, disaster recovery and business security "Best Practices" are among the many subjects introduced in this book. It also contains a great list of additional resources. Unlike many computer books this is very well written and easy to read. The authors ask readers key questions that will help develop a tailored and effective security program. This book has already found its way into many college courses and anyone interested in security would be well served by reading it. Keep in mind this is a non-technical introduction to the concepts and core skill areas of computer security and you wont learn how to configure your firewall or hack into a network. You will understand how to prepare and manage a security program very efficiently and that will have a greater impact on the security of you IT assets than a dozen "hacker secrets" books.
Rating: Summary: An excellent book for non-technical and technical readers Review: "Access Denied" is an excellent book for readers that want to understand the big picture of computer security. Network weaknesses, disaster recovery and business security "Best Practices" are among the many subjects introduced in this book. It also contains a great list of additional resources. Unlike many computer books this is very well written and easy to read. The authors ask readers key questions that will help develop a tailored and effective security program. This book has already found its way into many college courses and anyone interested in security would be well served by reading it. Keep in mind this is a non-technical introduction to the concepts and core skill areas of computer security and you wont learn how to configure your firewall or hack into a network. You will understand how to prepare and manage a security program very efficiently and that will have a greater impact on the security of you IT assets than a dozen "hacker secrets" books.
Rating: Summary: Access Denied Review: A well organized and easy to read book that seems to be written for the average person. As a student I have used this book in my research for papers and I have also used this book to help identify the holes in and to sure up my own network at home. It was also very helpful in explaining my home network and its security to my wife and my older children. A good read for anyone who even suspects his or her computers could be compromised. Another good book for network security is Uberhacker by Meinel
Rating: Summary: Access Denied Review: A well organized and easy to read book that seems to be written for the average person. As a student I have used this book in my research for papers and I have also used this book to help identify the holes in and to sure up my own network at home. It was also very helpful in explaining my home network and its security to my wife and my older children. A good read for anyone who even suspects his or her computers could be compromised. Another good book for network security is Uberhacker by Meinel
Rating: Summary: Broad scope and business focus Review: I enjoyed the broad scope and business focus of this book. Not being an engineer, I appreciated the business approach to security and risk management. The best practices are really useful as are the templates. After reading it I think that I can communicate with my engineers better and we have some common ground and understanding to build on. definitely a useful addition to my reading list
Rating: Summary: Key points in plain English Review: I really enjoyed this book. It was straight forward, to the point and provided some great best practices as solutions to some common security problems. A major problem with security is management. Too often the people making the important decisions do not understand the information that they are given. As the authors point out, Managers and technical staff speak different languages and that is the key problem here. Managers that read this book will gain a clear understanding of the problems that the IT staff faces, and IT people that read this book will understand the management side and will know how to speak to non-technical staff. This book is a perfect introduction to security and related business concerns.
Rating: Summary: the business side of security Review: Once in a while a book comes along that fills a gap in the market and this is one of those books. It was an eye opener and I would recommend that anyone in a management position read it. It is the first title that I found that actually approached security from the business side of the issue. The authors explain every security issue you can think of (and some that you would never think of) in non-technical language. There was a lot of food for thought in here. Due to the scope of the subjects covered technical people will have their eyes opened as well, and using this book alone you would be well on your way to writing an implementing a comprehensive security policy. It's all about processes and risk management and it hits the mark.
Rating: Summary: Great introduction Review: This book is a great introduction to security concepts and procedures. I've used it as a resource for college papers and I have used the templates to start a security policy. I recommend it to anyone that needs a well written primer on security.
Rating: Summary: Great overview and introduction Review: This book is a great overview of security and policy development. This is not a technical book, it does not teach you the specifics of any particular OS, or how to configure software. It does ask key questions, and gets you thinking about security programs and business practices. The policy template is an added bonus. I gave this book to my manager to help convince her that we needed to look at security differently and budget for it.
Rating: Summary: Great for beginners Review: This book is a great starter book on information security! I was wading though my copy grumbling "I know this, this, this...", when it occurred to me that I am not the intended audience. For some time, one of my friends was asking me for a good book on security for somebody who knows absolutely nothing about it. I gave him "Access Denied" - and now he is hooked. Several weeks has passed by and he is already asking for "Hacking Exposed"... "Access Denied" covers a wide range of security-related topics. The book is well written, logically organized and have everything to appeal to the beginners in the security field, those curious about modern (if not cutting edge) security topics and those migrating to security from other IT fields. Anton Chuvakin, Ph.D., GCIA, GCIH is a Senior Security Analyst with a major information security company. His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.org
|