Skip to content
Scan a barcode
Scan
Paperback The Internet Security Guidebook: From Planning to Deployment Book

ISBN: 0122374711

ISBN13: 9780122374715

The Internet Security Guidebook: From Planning to Deployment

The Internet Security Guidebook provides a complete analysis of an enterprise's Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise. Protection is not simply a firewall or technology; it is a strategy that encompasses risk, trust, business goals, security processes, and technology...

Recommended

Format: Paperback

Condition: New

$91.95
50 Available
Ships within 2-3 days

Customer Reviews

5 ratings

Excellent Security Handbook for any IT Exec

This book surprised me with its ability to break through the technical jargon and explain security in a very familiar sense. It gives an item-by-item breakdown of what companies need to do to get their networks in order. It also explains the pitfalls and the potential consequences very well. It should be on the bookshelf of every company's security auditor. I found it to be invaluable as a resource and very helpful in finding ways to expand my knowledge deeper into the areas of interest to me. It is obvious the authors are not only technically sound but have an understanding of what it all means from the business side. I would highly recommend it!

Cuts through the complexities of Internet security

This book should be required reading for every IT professional because unless security is everybody's business there will be no real security. The problem to date is that IT security is becoming increasingly complex, and the reality of Internet connectivity just adds to the complexity. What makes this book so valuable is that it clearly explains the fundamentals of Internet security and its most important parts in terms that someone who is not a security professional can understand. Aside from the complexities of security itself, factors such as cryptography, authentication and public key infrastructure and messaging are highly specialized and difficult for the non-practitioner to grasp. Again, this book clearly explained those in such a manner that you "get it".The authors don't stop with a great discussion of security in general and the technical issues in particular, they next lead you through the development of a plan to address common exposures. I like this approach. I also liked the response scenarios and advice for steps to be taken when you inevitably become a victim - and chances are that you will if your company is on the Internet (and what companies aren't these days?)This valuable 375-page book wraps up with a big picture view of a total security package and two appendices: one on available security tools and the other a computer emergency response team (CERT) report template. I highly recommend this book to anyone in IT, especially management, because awareness is the first step towards an effective security program. It is so well written and packed with great advice and information that it earns a solid 5 stars.

A must read for every IT Executive

A plain english review of what internet security means to the enterprise. There is enough information to educate without overwhelming the less-than-technical. If you are wondering if your company's internet connections are as secure as they need to be, this is the book for you. It is filled with references to helpful sites and software as well as guidelines for coming up with a security policy that fits any type of organization.Techies: Haven't been able to get your decision makers to listen to your security concerns? Buy them a copy of this book.

An essential tool for the security conscious

Easy to read and keeps your interest from the first page to the last. This book takes a holistic approach to Internet security. It is must reading for anyone interested in security.

From overview to undertaking

The bulk of information and the weight of responsibilty that surrounds internet security is enough to try the nerve of any systems administrator.This book simply cuts through the material - presenting a broad but never superficial view. This is the ideal book to find clarity and a jourbey through the whole process - an overview without simplification. Detailed action without bogged-down detail.The key words are clarity and useability. Highly recommended.
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured