Skip to content
Scan a barcode
Scan
Paperback Information Security: Protecting the Global Enterprise Book

ISBN: 0130173231

ISBN13: 9780130173232

Information Security: Protecting the Global Enterprise

PLEASE PROVIDE COURSE INFORMATIONPLEASE PROVIDE This description may be from another edition of this product.

Recommended

Format: Paperback

Condition: Acceptable

$14.69
Save $30.30!
List Price $44.99
Almost Gone, Only 1 Left!

Customer Reviews

5 ratings

i am in this book

naturally, since i am mentioned in this book, i must say that i am pleased. God bless you, author. God bless you.

Excellent information security overview

Information Security: Protecting the Global Enterprise is a very good guide to those looking for a management level introduction into the core concepts of information security.Pipkin writes in an easy to understand style without a lot of arcane acronyms or techno speak. The book has a good step-by-step approach and is a very good starting point for those looking to design their information systems security architecture. The book is a great place to start ones security roadmap and initiative and as a launching point for more in depth work.

Manage information at enterprise level

This is a very good book for IT people expand their security scope into enterprise level. Some other books take more an auditor's view, this one provides structures and practices just enough for IT people. Unless your organization need a BS7799 certification, this is the book you need to read through.

An excellent strategic guide

Pipkin's book is a nice guide to strategic information security. Don't expect buffer overflows, connection hijacking, or any other topics covered at Defcon -- this one's for planning and implementing corporate-wide security.It could be used as a step-by-step walk through for an IT or security manager on his/her foray into managing large-scale security. Heck, that's what I'm doing, and I'm following this book cover to cover.What are this book's strengths?Well, I particularly like the step-by-step approach. It carves the mammoth task into smaller, more manageable chunks. It lets me see where I'm going, and it helps me to decide how deeply I want to delve into each subject. Someone could easily spend months or longer on the first chapter about assessing value. Seeing the whole process gives me some perspective on where I need to spend the most time, and what kind of resources I'm going to need to plan and implement this security plan.What do I wish was different? Well, the outlines are a bit sparse sometimes. The book is really good at giving structure to this whole process, but it doesn't give too many details on how to go about accomplishing each and every task. I hesistate to call this a failing, however, because it's just -too- complex. I think the book is about as specific as it could be, given its high-level strategic approach. I'm using this book as my roadmap, and searching out much more in-depth information as it becomes necessary.In short, this book is a very welcome addition to my bookshelf. I'd recommend it to anyone responsible for information security.

A comprehensive look at computer security

Information Security is a must have for anyone involved with computer security. I realized that I've been securing computer systems by focusing on the 3-As (authentication, authorization and audit). This book describes 10 attributes of information security that have to be addressed. It has opened my eyes to areas of security that I had overlooked.
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured