The Secured Enterprise: Protecting Your Information Assets

4.33 avg rating
( 3 ratings by Goodreads )
9780130619068: The Secured Enterprise: Protecting Your Information Assets

In an era of hackers, alienated employees, and potential cyberterrorism, information security is the critical enterprise issue. The Secured Enterprise delivers an up-to-the-minute, nontechnical security briefing specifically for executive decision-makers. It demystifies every key aspect of information security -- people, process, and technology. Coverage includes securing e-commerce and VPNs, strengthening security policies, choosing third-party vendors, implementing PKI, securing wireless applications, and much more.

"synopsis" may belong to another edition of this title.

From the Back Cover:

Securing your key digital and information assets in an age of insecurity.

Securing enterprise data, applications, and intellectual property has become THE critical issue for business decision-makers in this era of hackers and potential cyberterrorism. But until now, most books on information security have been written for programmers and networking professionals, not business people. The Secured Enterprise: Protecting Your Information Assets fills the gap, delivering a non-technical, business-focused briefing on every key aspect of information security: frompeople to process to technology.

  • A guide to today's security threats—including cyberterrorism
  • How to establish effective, realistic security policies
  • The tools for defending your information assets
  • Effective mechanisms for identification, authentication, and access control
  • What firewalls can—and cannot—do
  • Vulnerability scanners, virus detectors, and intrusion detection systems
  • Virtual private networks: leveraging the cost savings without exposing your data to risk
  • Securing B2B and B2C e-commerce
  • How to evaluate third-party security products and services
  • New security options for wireless applications
Security has gotten more complex with time, and it has become more difficult to distill it. After reading this book you will understand security better and be more prepared to apply it in your enterprise.

—Jeff Moss,
Founder, DEF CON President,
Black Hat, Inc.

About the Author:

PAUL E. PROCTOR has worked with the CIA, FBI, and NSA on security issues andled a study of state-of-the-art intrusion detection methodology for the U.S. government.Currently Senior Vice President for NFR Security, Inc., he has spent his entire careerdeveloping information security systems and assisting large enterprises in theirdeployment. Proctor is also author of The Practical Intrusion Detection Handbook(Prentice Hall PTR).

F. CHRISTIAN BYRNES has worked for IBM, Oxford Software Corporation, andMETA Group. He is author of Security in Enterprise Computing: A Practical Guide, aglobal best-practices report that has become the benchmark for enterprise securityprocess formation by META Group clients worldwide.

"About this title" may belong to another edition of this title.

Top Search Results from the AbeBooks Marketplace


Paul Proctor and Christina Byrnes
ISBN 10: 013061906X ISBN 13: 9780130619068
New Quantity Available: 1
Castle Rock
(Pittsford, NY, U.S.A.)

Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97801306190681.0

More Information About This Seller | Ask Bookseller a Question

Buy New
Convert Currency

Add to Basket

Shipping: 3.05
Within U.S.A.
Destination, Rates & Speeds