Home :: Books :: Professional & Technical  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical

Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Information Security Architecture: An Integrated Approach to Security in the Organization

Information Security Architecture: An Integrated Approach to Security in the Organization

List Price: $84.95
Your Price: $84.95
Product Info Reviews

<< 1 2 >>

Rating: 2 stars
Summary: Great start but tails off
Review: Architecture books seems to be one of the "in" titles now and the upcoming releases and are badly needed. However, this book does not provide a thorough treatment of the topic.

The first two chapters begin well and if the remainder of the book had drilled into the issues, it would be superb, but such is not the case. Instead the result is an overview of much of the information security topic area.

It is a good book for non-security IT professionals and perhaps useful in an introductory course as a text, but inadequate for in-depth work in infrastructure design.

At the same time, this book is far superior to Held & Hundley's Security Architectures whichs dwells on Cisco PIX and router configurations and fails to consider how those pieces fit into a larger IT and IS architecture.

Rating: 2 stars
Summary: Great start but tails off
Review: Architecture books seems to be one of the "in" titles now and the upcoming releases and are badly needed. However, this book does not provide a thorough treatment of the topic.

The first two chapters begin well and if the remainder of the book had drilled into the issues, it would be superb, but such is not the case. Instead the result is an overview of much of the information security topic area.

It is a good book for non-security IT professionals and perhaps useful in an introductory course as a text, but inadequate for in-depth work in infrastructure design.

At the same time, this book is far superior to Held & Hundley's Security Architectures whichs dwells on Cisco PIX and router configurations and fails to consider how those pieces fit into a larger IT and IS architecture.

Rating: 1 stars
Summary: Is there a lower rating available?
Review: As a Certified Information Systems Security Professional, I can definitively state that this book does not cover everything that needs to be covered or in any depth whatsoever. I got this book based on the glowing reviews I found here, and I'm at a loss as to why these reviews would have recommended it.

The most aggrevating part about this book is the subtitle "An Integrated Approach to Security in the Organization." The book not only lacks effective security integration techniques, it doesn't seem to address the entire organization where it tries its half-hearted integration.


Rating: 5 stars
Summary: Information Security Architechture by Jan Tudor
Review: I am a CSS student with the College of North Atlantic, St.John's
, Newfoundland. I think that Jan Tudor has put together the "manual" for security within the buisness structure. I am amazed at the debt and scope of this book as there is no stone unturned and information technology people would be at a loss not to read and understand just how security or the lack of it can make or break a buisness, large or small.A true work of art, thanks Jan.

Rating: 5 stars
Summary: Information Security Architechture by Jan Tudor
Review: I am a CSS student with the College of North Atlantic, St.John's
, Newfoundland. I think that Jan Tudor has put together the "manual" for security within the buisness structure. I am amazed at the debt and scope of this book as there is no stone unturned and information technology people would be at a loss not to read and understand just how security or the lack of it can make or break a buisness, large or small.A true work of art, thanks Jan.

Rating: 5 stars
Summary: Very Informative
Review: I have worked with Jan with our security project & the company I work for has really benefited from the knowledge and expertise from Jan's book. In addition, we have used the structure she illustrates in "Information Security Architecture" for implementing our company's Security Project and it is well underway due to Jan's helpful contribution. I recommend this to anyone who will be working to lay the groundwork for Security purposes. This is a valuable piece of information - Great work Jan!

Rating: 5 stars
Summary: Very Informative
Review: I have worked with Jan with our security project & the company I work for has really benefited from the knowledge and expertise from Jan's book. In addition, we have used the structure she illustrates in "Information Security Architecture" for implementing our company's Security Project and it is well underway due to Jan's helpful contribution. I recommend this to anyone who will be working to lay the groundwork for Security purposes. This is a valuable piece of information - Great work Jan!

Rating: 1 stars
Summary: Unrealistic Drivel
Review: I question the security background of any of those who read this book and gave it a good review. The author's approach security leaves huge gaps and what is covered is written in a simplistic form... probably because the author only understands a small amount of the topic she is writing about.

I question the author's own ability to secure an environment, and she should probably not be teaching others.

Rating: 5 stars
Summary: A Realistic Approach to the Implementation of Security
Review: There is so much involved in implementing security effectively throughout an organization. Without detailed experience it is easy to get lost in the midst of it all. Jan Tudor's book provides an organized thought process to the tasks at hand when implementing security in an integrated approach. This book provides a good combination of management, administration and technical implementations to security. The checklists, templates and forms eliminate the need to start an ISA project from scratch. This book is highly recommended and practical if you are going to take on such a project.

Rating: 5 stars
Summary: A Realistic Approach to the Implementation of Security
Review: There is so much involved in implementing security effectively throughout an organization. Without detailed experience it is easy to get lost in the midst of it all. Jan Tudor's book provides an organized thought process to the tasks at hand when implementing security in an integrated approach. This book provides a good combination of management, administration and technical implementations to security. The checklists, templates and forms eliminate the need to start an ISA project from scratch. This book is highly recommended and practical if you are going to take on such a project.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates