What's new in this second edition? Updated information on keeping your system hacker free. Includes endpoint, mobil-device, and wireless security. New chapters on encryption, regulatory compliance, working with auditors, and security-awareness training. New chapter on security and emerging Web 2.0 technologies. Ever wonder how a hacker could break into a computer system simply by using a screwdriver? New technologies for defeating these types of physical attacks are also in this second edition. Moreover, this book not only explains such gimmicks, but it also makes clear why taking care of physical security, creating a readable IT security policy, and maintaining best practices when hiring employees are just as important as understanding the dirty tricks that hackers possess in their toolkits. Social engineering -- the low-tech but most effective way to break into a computer system -- and how to defeat it are described in detail. IT security managers and auditors will find the checklists vital for organizing a comprehensive IT security program. From analyzing risk and securing applications to setting a program for meeting the security challenges of regulatory compliance, there is something useful to any IT professional in The Little Black Book of Computer Security. Handy references to pertinent Web sites and tools are also included.
Customer Review: It Audit looks at IT Security
This is a tidy little book. I referred to the first edition often, but the second edition is better. It includes me!
Right there in Chapter 19, "Working with Compliance Auditors and Regulators".
It suggests that working with internal auditors is a viable strategy. That IT auditors can help IT security to be in top shape before the regulators come knocking.
Nice to hear this from a security guy. Finally!
Customer Review: Updated with Current and Relevant Information
The Little Black Book of Computer Security - 2nd Edition does not teach you computer security. You will have to rely on other resources to teach you the nuts and bolts of information security. However, once you understand the fundamentals, Dubin's book can be an invaluable resource to help you create an action plan and ensure you are covering all of your bases to protect your network and your data.
Dubin's book is like a portable plan of action. Each chapter contains a few brief paragraphs with an overview of the problem and why you should protect your computer. He then provides a checklist, in outline form, that a manager can use to determine if their computers are adequately protected or identify what is missing and plug the holes.
Notes, Tips, and Sidebars scattered throughout the checklists highlight the more important information and concepts to ensure you don't miss anything. In addition, Dubin provides references to let you know where you can find more detailed information for really important topics.
The 2nd edition of The Little Black Book of Computer Security builds on the original by including the vast changes that have occurred in information security over the past few years. Dubin includes sections specifically devoted to privacy and identity theft, regulatory compliance, and protecting Web servers from the next-generation attacks that have plagued web sites recently.
In addition, as if the checklist form of the book isn't compact and concise enough, the book includes a variety of appendices which contain even more compact information. The list of Web Sites to Check Daily, Tools of the Trade, and Common TCP Ports are great reference tools.
There are plenty of books on all topics of computer security. Dubin's book is unique in how it helps you apply all of the information from the other books and information resources.
Buy Now
Thursday, January 22, 2009
The Little Black Book of Computer Security, Second Edition
Posted by admin at 12:35 PM
Labels: Computer Security
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment