Security Strategy: From Requirements to Reality
Autor Bill Stackpole, Eric Oksendahlen Limba Engleză Paperback – 13 oct 2010
The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise.
Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.
Preț: 397.51 lei
Preț vechi: 577.05 lei
-31% Nou
Puncte Express: 596
Preț estimativ în valută:
76.07€ • 80.01$ • 63.56£
76.07€ • 80.01$ • 63.56£
Carte tipărită la comandă
Livrare economică 09-23 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781439827338
ISBN-10: 1439827338
Pagini: 346
Ilustrații: 23 b/w images and 43 tables
Dimensiuni: 178 x 254 x 23 mm
Greutate: 0.59 kg
Ediția:New.
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 1439827338
Pagini: 346
Ilustrații: 23 b/w images and 43 tables
Dimensiuni: 178 x 254 x 23 mm
Greutate: 0.59 kg
Ediția:New.
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic and Professional Practice & DevelopmentCuprins
STRATEGY. An Introduction. Getting to the Big Picture. Testing the Consumer. Strategic Framework (Inputs to Strategic Planning). Developing a Strategic Planning Process. Gates, Geeks, and Guards (Security Convergence). TACTICS. Tactics: An Introduction. Layer upon Layer (Defense in Depth). Did You See That?! (Observation). Trust but Verify (Accountability). SDL and Incident Response. Keep Your Enemies Closer. Hire a Hessian (Outsourcing). Security Awareness Training. Appendix: Physical Security Checklists.
Recenzii
This book focuses on the process, objectives, and controls of security strategy. It consists of two sections: Strategy (6 chapters) and Tactics (8 chapters). The sections include strategy how-to’s and security tactics, which support the realization of security. The strategy portion is aimed at executives, whereas the tactics portion is geared toward security professionals. … The authors—both security veterans—share many personal anecdotes. They use relevant quotes and concisely illustrate their points. The book addresses security quality attributes promoted by the Architecture Tradeoff Analysis Method (ATAM) and used in the Sherwood Applied Business Security Architecture (SABSA) framework … .
—A. Marlen, Reviews.com
—A. Marlen, Reviews.com
Notă biografică
WilliamBill Stackpole , CISSP/ISSAP, CISM, former Principal Security Architect for Microsoft Online Services, has more than 25 years of IT experience in security and project management. In his past position, Bill provided thought leadership and guidance for Microsoft's Secure Online Services Delivery Architecture. Before joining Microsoft, Bill was a principal consultant for Predictive System, an international network consultancy where he was the architect and promoted the application security business. Bill holds a B.S. degree in Management Information Systems, a CISSP with an Architecture Professional endorsement. He is co-author of Software Deployment,Updating, and Patching (Auerbach, 2007) and a contributing editor to Auerbach's Handbook on Information Security Management (Krause and Tipton). Bill is a former chair for the CISSP Test Development Committee and a current member of the (ISC)2 Common Body of Knowledge committees for the CISSP and ISSAP certifications. Eric Oksendahl , former Security Strategist for Boeing, has more than 25 years of experience as a business management consultant, senior facilitator, teacher, and program manager. At Boeing, Eric facilitated strategy development and implementation for the Security and Fire Protection division, including physical and information security. He designed and coordinated the use of strategy development and initiative deployment to integrate security practices into key business processes (e.g., international sales campaigns). Prior to that, Eric was a program manager at the Boeing Leadership Center where he conducted leadership development courses around the world that included Boeing management, supplier management, and customer management. Eric holds a B.A. from Montana State University and an M.A. in Communications from the University of Washington.
Descriere
Clarifying the purpose and place of strategy in an information security program, this book explains how to select, develop, and deploy the security strategy best suited to an organization. It focuses on security strategy planning and execution to provide a comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics that support the implementation of strategic planning initiatives, goals, and objectives.