A Beginner's GuideBook - 2013
Maiwald, who specializes in enterprise security infrastructure and mobility technologies and has worked as a security officer and consultant for various companies, provides information security professionals with the basic tools needed to manage security issues. He explains what information security is; the four basic types of attacks, considerations when attacking electronic information, and how to protect information that exists only on paper; hacker techniques, motivations, and methods; services for protection against attacks (confidentiality, integrity, availability, and accountability); the types, creation, deployment, and use of policies; managing and measuring risk; the information security process, risk assessments, security implementation and awareness, and audits; best practices and administrative and technical security practices; creating a perimeter security architecture and monitoring architecture; and using encryption. Annotation ©2013 Book News, Inc., Portland, OR (booknews.com)
Security Smarts for the Self-Guided IT Professional
Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide, Third Edition is fully updated to include thelatest and most effective security strategies.
You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security services to protect information and systems. Perimeter, monitoring, and encryption technologies arediscussed in detail. The book explains how to create and deploy an effective security policy, manage and assess risk, and perform audits. Information security best practices and standards, including ISO/IEC 27002, arecovered in this practical resource.
Network Security: A Beginner's Guide, ThirdEdition features:
- Lingo--Common security terms defined so that you're in the know on the job
- IMHO--Frank and relevant opinions based on theauthor's years of industry experience
- Budget Note--Tips for getting security technologies and processes into your organization's budget
- In Actual Practice--Exceptions to the rules of security explained in real-world contexts
- Your Plan--Customizable checklists you can use on the job now
- Into Action--Tips on how, why, and when to applynew skills and techniques at work