Information Security Best Practices: 205 Basic Rules
Author | : | |
Rating | : | 4.44 (726 Votes) |
Asin | : | 1878707965 |
Format Type | : | paperback |
Number of Pages | : | 160 Pages |
Publish Date | : | 2016-05-25 |
Language | : | English |
DESCRIPTION:
Stefanek, Ph.D., has over 18 years of experience as a systems administrator and manager of IS/IT departments. Department of Defense. He has also consulted on information security issues for such clients as the U.S. . George L
Eric Kent said too many mistakes/no best practices. This book had a lot of potential, but it has far too many mistakes.It does not take into consideration corporate best practices.There are better books out there, use them.. "Too many mistakes and errors in this book" according to Ben Rothke. Security 101 dictates the importance of an effective set of information security policies and procedures. The granddaddy of such books is Information Security Policies Made Easy by Charles Cresson Wood that contains over 1000 well-written security policies.The importance of best practices for information security is easily understood in the post September 11 era, combined with the fact that more and more companies are connecting their corporate networks to untrusted public networks without the appropriate level of security and protection.With such a need, Information Security Best Practices: 205 Basic Rules sounded like it could fill such a . Danette Sterna said Excellent Book. I thought this book was very easy to read and understand. I must commend the author for making technical material so easy to understand even for a novice like myself. Everything I wanted to know about information security was in this book. I highly recommend it.
From the Publisher Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment. . This book presents a simple set of rules important in maintaining good information security
This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment.All disc-based content for this title is now available on the Web.* Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network. Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their informat