AnyBook4Less.com | Order from a Major Online Bookstore |
![]() |
Home |  Store List |  FAQ |  Contact Us |   | ||
Ultimate Book Price Comparison Engine Save Your Time And Money |
![]() |
Title: Surviving Security: How to Integrate the Process, and Technology by Amanda Andress, Mandy Andress ISBN: 0-672-32129-7 Publisher: Sams Pub. Date: 10 July, 2001 Format: Paperback Volumes: 1 List Price(USD): $39.99 |
Average Customer Rating: 4.8 (5 reviews)
Rating: 5
Summary: Broad coverage of how to implement security
Comment: Thousands of years ago, a geometry teacher informed his royal subject and student that there was no royal road or shortcut to the understanding of geometry. That statement also holds true for computer system security. Like the steps in a geometric proof, any shortcut taken in security has the potential for invalidating the entire structure. Furthermore, developing a sound security policy requires that many of our deeply held social and legal attitudes be set aside.
In the American legal structure, any person is entitled to the presumption of innocence until their guilt is proven. However, to create and maintain an adequate computer security policy, everyone must be assumed untrustworthy until it has been proven otherwise. This creates an enormous potential for hard feelings, leading some to bypass the controls as a form of protest. Sound security policies also erects barriers that often reduce the efficiency of everyone accessing the system, creating an ongoing dent in the company bottom line. With all of this social, technical and economic baggage, it would appear that constructing an effective security system would be impossible. While constructing an impenetrable system is impossible, one can always reach a best possible level, and you see how to do it in this book.
All of the problems in computer security, from the initial meeting to regular audits are covered in this book. As the title implies, the emphasis is on the integration of the many parts that interact to build a secure system. Knowledge of human psychology is important, as the users must be treated with an iron fist wrapped inside a fuzzy velvet glove. The coverage is thorough in the broad sense, but shallow in the depth sense. This is not a criticism, just a statement of fact. Each section has links to resources that provide the depth of explanation that may be needed.
Security puts another level of complexity on top of the very difficult task of writing software that works. In the past, getting software to work took priority over getting it to work in a secure manner. Those days are gone and it is very difficult to conceive of any scenario where that will change. No one knows when it occurred, but several years ago, the cost of paying for security fell below the cost of repairing the damage caused by lax security practices. To get on the right side of this critical curve, read this book and follow the advice.
Rating: 5
Summary: So much great Info
Comment: One of the few technology books that is actually under-priced based on the value you'll get from it. Content is very good and it's an easy read. You don't have to already be a security wiz to understand. There is also some unique treatment to process issues that I haven't seen elsewhere... Highly recommended.
Rating: 5
Summary: Mandatory Book For The Security Professional
Comment: I have been an information assurance professional for over 40-years. This is the only book that ties it all together and provides so many additonal bonuses that you cannot go wrong for the price.
What I found best about the book:
1. Great price for all the pertinent and up-to-date information, including references and URL's,
2. Complete, concise, focused; no wandering down memory lane,
3. A great study reference guide in preparation for the CISSP examination (I used it, I took the exam, I am now certified as an Information System Security Professional),
4. The book will be a solid reference for years to come,
5. The author knows her subject and presents it in such a logical manner that it is impossible not to grasp the concepts presented.
6. Can use the author's web site for this book so that you maintain your currency (who else offers this?),
7. If your on the security profession career path this book is mandatory, and
8. Where in the hell (heck) was this book 10-15 years ago.
Thank you for visiting www.AnyBook4Less.com and enjoy your savings!
Copyright� 2001-2021 Send your comments