Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
|
|
A Practical Guide to Managing Information Security (Artech House Technology Management Library) |
List Price: $83.00
Your Price: $83.00 |
|
|
|
Product Info |
Reviews |
<< 1 >>
Rating: Summary: Excellent Review: Excellent. This book strikes exactly the right balance between providing real-life, pragmatic guidance in the management of information security, and at the same time provides sufficient technical and operational depth to the subject matter overall. The book is well structured and very clear, and provides a coherent approach to addressing strategic and tactical information security issues. Security technologies, policies, procedures and processes are clearly explained and practically demonstrated but the greatest benefit of this book is that it sets risk and security in the context of a functioning organisation - in this case a bank - and provides answers to the concerns of senior management, technical staff and business managers in a way that supports, not hinders, the organisation. Highly recommended reading.
Rating: Summary: A must read for the IT security professional! Review: Steve focuses on providing practical guidance for the IT security professional. He not only focuses on the security elements of deploying and managing IT security initiatives but he also describes the more crucial management aspects of it as well. Written by a security practioner for security practioners, this book is a must read for anyone seriously engaged in the field.
Rating: Summary: Good Book... Review: This book is a good resource for security professionals. It provides a broad review of Information Security management techniques and describes some of the controls, mainly technical controls. The fictitious case study is useful because it illustrates the way decisions are often made in real life and provides examples of the kind of trade-offs that are often necessary. This is definitively not an IT Security encyclopedia. However the main areas of IT Security are covered without making a decision on behalf of the reader.
<< 1 >>
|
|
|
|