Information Security: Protecting the Global Enterprise
Author | : | |
Rating | : | 4.34 (514 Votes) |
Asin | : | 0130173231 |
Format Type | : | paperback |
Number of Pages | : | 364 Pages |
Publish Date | : | 2013-08-13 |
Language | : | English |
DESCRIPTION:
Donald L. He is a frequent speaker on the topic both regionally and internationally. Pipkin is a Security Systems Architect for the Internet Security Division of Hewlett-Packard. He is also the author of Halting the Hacker: A Practical Guide to Computer Security, a contributing author of
An excellent strategic guide Chad Pipkin's book is a nice guide to strategic information security. Don't expect buffer overflows, connection hijacking, or any other topics covered at Defcon -- this one's for planning and implementing corporate-wide security.It could be used as a step-by-step walk through for an IT or security manager on his/her foray into managing large-scale security. Heck, that's what I'm doing, and I'm following this book cove. An obstacle to understanding I currently am taking a course in computer security, for which this book is required reading. To be kind, I will say that, rather than being a resource that augments and highlights the material that the instructor presents in his lectures, this book is an obstacle to understanding computer security. A quick examination of sample sentences from chapters 8 and 9 shows why.p. 112: "Access should allow anyone who is . An obstacle to understanding I currently am taking a course in computer security, for which this book is required reading. To be kind, I will say that, rather than being a resource that augments and highlights the material that the instructor presents in his lectures, this book is an obstacle to understanding computer security. A quick examination sample sentences from chapters 8 and 9 shows why.p. 112: "Access should allow anyone who is aut
It addresses the business concerns of management as they pertain to information security. This intellectual property is paramount to the organization's survival. These post-incident procedures are necessary for the organization to learn from the incident and share that experience. From the Inside Flap Preface Information security is more than computer data security. . It is a must for anyone who is responsible for information assets or a complete overview of information security. Businesses are built on their information — their company secrets. Access defines the medium used to contact the resource. Detection is required for those things that cannot be protected or predicted. Administration is the ability to manage the security attributes of the information. Accuracy is the assurance that the information is correct. Reflection is the follow-up processes necessary to evaluate the quality of the security implementation. It delves into the issues involved with understan
PLEASE PROVIDE COURSE INFORMATIONPLEASE PROVIDE