Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Security Assessment: Case Studies for Implementing the NSA IAM

Security Assessment: Case Studies for Implementing the NSA IAM

List Price: $69.95
Your Price: $44.07
Product Info Reviews

<< 1 >>

Rating: 3 stars
Summary: Good Resource For Implementing NSA IAM
Review: The authors' have a wealth of experience in information security and with the IAM framework. They convey this experience through case studies derived from real-world scenarios to provide examples that illustrate the IAM in action.

Security Assessment demonstrates how to apply the NSA IAM to commercial and government organizations alike to determine the relative security of their network. The authors' provide tips and advise readers of pitfalls to watch out for as they guide you through performing an IAM security assessment.

The book is both informative and at times entertaining as it walks through sample scenarios. It also provides some templates and sample deliverables that readers can use.

The authors' knowledge and experience is evident throughout, however parts of the book are slightly confusing or hard to follow. Sometimes it seemed as if extra words were added in just to stretch the chapter out without providing any benefit in terms of relaying information. But, overall I think that network or security administrators and particularly those tasked with actually following the NSA IAM will benefit greatly from reading this book.

Tony Bradley is a consultant and writer with a focus on network security, antivirus and incident response. He is the About.com Guide for Internet / Network Security (http://netsecurity.about.com), providing a broad range of information security tips, advice, reviews and information. Tony also contributes frequently to other industry publications. For a complete list of his freelance contributions you can visit Essential Computer Security (http://www.tonybradley.com)

Rating: 2 stars
Summary: Disappointed...
Review: This book disappointed me with it's lack of content and diffused focus. Pages of boorish, made up examples with irrelevant details did not provide the necessary information needed to understand and implement the very abstract IA-CMM v 3.0.

I would wish that I had spent this amount of money on something with more real world examples that was written in a more concise and pregnant style. I would have appreciated software templates sold with the book as well. Some parts of the book are incomprehensible. I find this on P.197:

"Warning:
It would be a very good idea to define the term system in this section. May people reading this document for the first time may not comphrehend the deifference between calling a server a system and calling a collection of servers or networks a system. This lack of comprehension can sometimes lead to seriuos confusion and misunderstanding. A brief heading at the beginning of this section can go a long way to alleviating any issues before they arise."

I have no idea what this paragraph meant to say. Unfortunately, this was not the only time I experienced a lack of clarity and concision while reading this book. As a personal note, I found that having the URL www.syngress.com listed at the bottom of every chapter page was an unprofessional and distractive advertising technique. Are even books now to be invaded by SPAM?

I hope to see more concise and focused material with less abstract examples published on implementing the IA CMM v. 3.0.

Rating: 5 stars
Summary: Security Assessment a MUST have
Review: Whether you are an experienced security professional or just starting out in security, this book is a MUST for anyone serious about security. Although I have taken the NSA IAM training in the past, this book is a great compliment to the training.

The authors have combined their professional experience using the IAM with feedback and experiences from class participants and customers, and applied them to real world, practical, case studies. It demonstrates how the IAM, a thorough hands-off security assessment methodology, can be applied to both government and commercial entities. The book guides you through the entire IAM process, with highlighted tips and caveats that you will not get from any other source.

After you complete this insightful book, you will be armed with information that will be valuable to you, your company, and your customers in performing a thorough hands-off security assessment. This book will be a great reference for the IEM.

Rating: 5 stars
Summary: Security Assessment a MUST have
Review: Whether you are an experienced security professional or just starting out in security, this book is a MUST for anyone serious about security. Although I have taken the NSA IAM training in the past, this book is a great compliment to the training.

The authors have combined their professional experience using the IAM with feedback and experiences from class participants and customers, and applied them to real world, practical, case studies. It demonstrates how the IAM, a thorough hands-off security assessment methodology, can be applied to both government and commercial entities. The book guides you through the entire IAM process, with highlighted tips and caveats that you will not get from any other source.

After you complete this insightful book, you will be armed with information that will be valuable to you, your company, and your customers in performing a thorough hands-off security assessment. This book will be a great reference for the IEM.

Rating: 5 stars
Summary: The IAM from a real world perspective
Review: Whether you are currently performing IAM assessments, or if you or your organization wants to begin using the IAM, this book is an excellent reference.

As any assessor knows, there is no such thing as two identical assessments. That said, the authors provide a cross section of examples that illustrate many different situations that you will see on site.

The authors of this book are THE authorities on the IAM and the information they present will help new assessors build a foundation for using the IAM while at the same time providing information that is essential for a practicing assessor to add to his arsenal.

Overall an outstanding book.


<< 1 >>

© 2004, ReviewFocus or its affiliates