LATEST DISCOUNTS & SALES: PROMOTIONS

Close Notification

Your cart does not contain any items

Surviving Security

How to Integrate People, Process, and Technology

Amanda Andress

$252

Hardback

Not in-store but you can order this
How long will it take?

QTY:

English
Auerbach
18 December 2003
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers both the overall security infrastructure and the roles of each individual component. This book provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security measures such as encryption, authentication, firewalls, intrusion detection, remote access, host security, server security, and more. After reading this book, you will know how to make educated security decisions that provide airtight, reliable solutions.

About the Author Amanda Andress, CISSP, SSCP, CPA, CISA is Founder and President of ArcSec Technologies, a firm which focuses on security product reviews and consulting. Prior to that she was Director of Security for Privada, Inc., a privacy company in San Jose, California. She built extensive security auditing and IS control experience working at Exxon and Big 5 firms Deloitte & Touche and Ernst & Young. She has been published in NetworkWorld, InfoWorld, Information Security Magazine, and others, and is a frequent presenter at industry events such as N+I and Black Hat.

By:  
Imprint:   Auerbach
Country of Publication:   United Kingdom
Edition:   2nd edition
Dimensions:   Height: 234mm,  Width: 156mm,  Spine: 33mm
Weight:   1.140kg
ISBN:   9780849320422
ISBN 10:   0849320429
Pages:   528
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Hardback
Publisher's Status:   Active
Why Do I Need Security? Understanding Requirements and Risk. Security Policies and Procedures. Cryptography and Encryption. Authentication. Network Architecture and Physical Security. Firewalls and Perimeter Security. Network Management and Device Security. Wireless Network Security. Intrusion Detection. Remote Access. Host Security. Server Security. Client Security. Application Development. Security Maintenance and Monitoring. Vulnerability Testing. Security Audits. Incident Response. Integrating People, Process, and Technology. Trends to Watch.

Andress, Amanda

Reviews for Surviving Security: How to Integrate People, Process, and Technology

"""Surviving Security is a crash course in all of the things that we should be doing in cyberspace that don't come naturally to most of us. It is a soup-to-nuts portrayal of how to do security right, from an experienced practitioner of digital security in real-world environmentsPerhaps the best thing about this book, though, is that it's up-to-date. Mandy hasn't written just another cookbook recitation of the three R's of security, she has built a comprehensive structure on sound principles and extended it with her intimate knowledge of exciting new technology I see few other titles on the shelves that can match this volume of experience and expertise in such a concise, lucidly written, and easy to read package."" Joel Scrambray, Co-author, Hacking Exposed from The Foreword"


See Also