- Shopping Bag ( 0 items )
Securing enterprise data, applications, and intellectual property has become THE criticalissue for business decision-makers in this era of hackers and potential cyberterrorism. Butuntil now, most books on information security have been written for programmers andnetworking professionals, not business people. The Secured Enterprise: ...
Securing enterprise data, applications, and intellectual property has become THE criticalissue for business decision-makers in this era of hackers and potential cyberterrorism. Butuntil now, most books on information security have been written for programmers andnetworking professionals, not business people. The Secured Enterprise: Protecting YourInformation Assets fills the gap, delivering a non-technical, business-focused briefing onevery key aspect of information security: frompeople to process to technology.
Security has gotten more complex with time, and it has become more difficult to distill it. After readingthis book you will understand security better and be more prepared to apply it in your enterprise.
Founder, DEF CON President,
Black Hat, Inc.
|Introduction: How to Read This Book|
|Pt. 1||Introduction to Security||1|
|1||Introduction to Security||3|
|4||Authentication, Authorization, Access Control||53|
|Pt. 2||Security Technologies||67|
|7||Virus Detection and Content Filters||105|
|9||Public Key Infrastructure and Encryption||141|
|11||Mobile Workers and Wireless LANs||167|
|13||Digital Signatures and Electronic Commerce||189|
|14||Establishing a Security Program||205|
|16||Managed Security Services||227|
|17||Response and Recovery||237|
|18||Implementing Web and Internet Security||245|
|Pt. 4||Odds and Ends||259|
|20||Putting It All Together||281|
This book is directed to business people who are tasked with computer security responsibility, but it will also have value to security professionals looking for an overview. As such, security is viewed from a business perspective throughout the book. Topics are explored in a variety of technical depths to explain fully the impact on business and to give business professionals sufficient understanding to work effectively with their technical people. Whether you think of it as information technology (IT), information services (IS), or just the computer people, without a competent guide, security can go right over your head.
This book is divided into four sections.
This section introduces you to security, the threats you are protecting yourself from, and the basic technologies you will need to protect yourself.
This section explains the protection methods used commonly in today's business environment. This is where you will read about firewalls, virus protection, intrusion detection, etc.
This section focuses on implementation methods and choices for different sizes of businesses. In Part 3, you will read about risk assessment, configuration, deployment, and managed security services.
This section includes discussions of legal issues, company politics, and other factors necessary in your success with information security.
To help you, the authors have provided plenty of examples, anecdotes, and technical descriptions to guide you.The authors understand thatbusinesses are not created equal. To accommodate different sizes of businesses, we offer the following guides to help you find the information relevant to your situation.
A large enterprise is one with more than 1,000 servers, more than $1 billion in revenue, and more than 2,000 employees. Large enterprises are usually characterized by multiple worldwide sites and special requirements, such as "follow the sun" management. Large enterprises will likely require more security expertise than is offered in this book.
Medium-sized businesses have over $100 million in revenue, more than 100 servers, and over 500 employees. Medium businesses usually have multiple sites. This book will be especially useful to executives and managers of medium-sized businesses.
A small business has less than $100 million in revenue, fewer than 100 servers, and fewer than 100 employees. Although most of the information in this book will have value to small businesses, some of it may be more than is necessary.
Security is a journey, not a destination. There will not be a point in this journey when you can say, "Now I'm secure." This book will be your road map.<%TOC%> Foreword.
I. INTRODUCTION TO SECURITY.1. Introduction to Security.
II. SECURITY TECHNOLOGIES.
IV. ODDS AND ENDS.