Skip to content
Hardcover Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition Book

ISBN: 0849315492

ISBN13: 9780849315497

Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Hardcover

Condition: Very Good

$9.49
Save $140.51!
List Price $150.00
Almost Gone, Only 1 Left!

Book Overview

Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.

In addition to the components of a successful Information Security Architecture (ISA) detailed...

Customer Reviews

5 ratings

Book is a good foundation upon which to build a security architecture

Architecture is the art and science of designing buildings and other structures. Using some creative license, it also encompasses the design of any entity, including information systems and their security components. But while no one would build a building without an architect, IT departments routinely design computer systems without considering the security architecture, instead believing that firewalls and other devices are quick and durable fixes. Nothing could be further from the truth. In Information Security Architecture, author Jan Killmeyer Tudor shows that an effective and comprehensive information security infrastructure is best developed within the framework of an information security architecture (ISA), given today's distributed nature of client/server computing. In the past, when systems were closed and proprietary, security wasn't as compelling a need as it is in today's open systems. The book covers important ISA issues such as the nature of the organization, policies and standards, baselines and risk assessment, awareness and training, compliance, and more. An underlying message is that these components must work in concert to form a cohesive ISA. Hardware and software are ineffective if they are not integrated into the ISA. A dominant theme throughout is that implementing security technologies requires an understanding not only of the technologies' return on investment to the organization but also of the risks and vulnerabilities related to these technologies. This ISA methodology gives security professionals an excellent method for achieving just that. Given how important policy is to an ISA, the book has several appendices that include policies, procedures, and work plans. These provide a fine foundation upon which to build a security architecture.

Information Security Architechture by Jan Tudor

I am a CSS student with the College of North Atlantic, St.John's , Newfoundland. I think that Jan Tudor has put together the "manual" for security within the buisness structure. I am amazed at the debt and scope of this book as there is no stone unturned and information technology people would be at a loss not to read and understand just how security or the lack of it can make or break a buisness, large or small.A true work of art, thanks Jan.

THOROUGH REFERENCE GUIDE

This was a great reference to start an Information Security Architecture project. There are many guidelines, procedures and forms that take the guess work out of the administration of such a project. The book is great at keeping you on track with your security objectives. I have found that it is so easy with such large projects to lose sight of the objectives. Security is not only technical assessments of the network and operating components but also a combination of management and administration of personnel, policies and procedures and continuous application of pressure to meeting the security requirements of an organization. This book provides excellent value for the price.

Very Informative

I have worked with Jan with our security project & the company I work for has really benefited from the knowledge and expertise from Jan's book. In addition, we have used the structure she illustrates in "Information Security Architecture" for implementing our company's Security Project and it is well underway due to Jan's helpful contribution. I recommend this to anyone who will be working to lay the groundwork for Security purposes. This is a valuable piece of information - Great work Jan!

A Realistic Approach to the Implementation of Security

There is so much involved in implementing security effectively throughout an organization. Without detailed experience it is easy to get lost in the midst of it all. Jan Tudor's book provides an organized thought process to the tasks at hand when implementing security in an integrated approach. This book provides a good combination of management, administration and technical implementations to security. The checklists, templates and forms eliminate the need to start an ISA project from scratch. This book is highly recommended and practical if you are going to take on such a project.
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured