Information Security Architecture and over one million other books are available for Amazon Kindle. Learn more

Vous voulez voir cette page en français ? Cliquez ici.

Sign in to turn on 1-Click ordering.
Amazon Prime Free Trial required. Sign up when you check out. Learn More
More Buying Choices
Have one to sell? Sell yours here
Start reading Information Security Architecture on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition [Hardcover]

Jan Killmeyer

List Price: CDN$ 117.17
Price: CDN$ 89.77 & FREE Shipping. Details
You Save: CDN$ 27.40 (23%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 1 left in stock (more on the way).
Ships from and sold by Gift-wrap available.
Want it delivered Monday, November 24? Choose One-Day Shipping at checkout.


Amazon Price New from Used from
Kindle Edition CDN $75.84  
Hardcover CDN $89.77's 2014 Books Gift Guide
2014 Books Gift Guide
Yes Please is featured in our 2014 Books Gift Guide. More gift ideas

Book Description

Jan. 13 2006 0849315492 978-0849315497 2
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.

In addition to the components of a successful Information Security Architecture (ISA) detailed in the previous edition, this volume also discusses computer incident/emergency response. The book describes in detail every one of the eight ISA components. Each chapter provides an understanding of the component and details how it relates to the other components of the architecture. The text also outlines how to establish an effective plan to implement each piece of the ISA within an organization.

The second edition has been modified to provide security novices with a primer on general security methods. It has also been expanded to provide veteran security professionals with an understanding of issues related to recent legislation, information assurance, and the latest technologies, vulnerabilities, and responses.

Special Offers and Product Promotions

  • Join Amazon Student in Canada

Customers Who Bought This Item Also Bought

Product Details

Inside This Book (Learn More)
Explore More
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on (beta) 3.2 out of 5 stars  5 reviews
5.0 out of 5 stars quality April 14 2014
By Pansy Caldwell - Published on
Format:Hardcover|Verified Purchase
This book was for school. It cost me almost nothing and was just like a brand new book. It was much cheaper than it would have cost me through my school.
5.0 out of 5 stars Used for Doctoral Research April 9 2013
By Archie Harville - Published on
Format:Kindle Edition|Verified Purchase
Book was recommended by instructor. The only this is that it is has been a few years since it was published and needs an update. It is truly a great resource.
4 of 7 people found the following review helpful
4.0 out of 5 stars Book is a good foundation upon which to build a security architecture Jan. 31 2007
By Ben Rothke - Published on
Architecture is the art and science of designing buildings and other structures. Using some creative license, it also encompasses the design of any entity, including information systems and their security components. But while no one would build a building without an architect, IT departments routinely design computer systems without considering the security architecture, instead believing that firewalls and other devices are quick and durable fixes.

Nothing could be further from the truth. In Information Security Architecture, author Jan Killmeyer Tudor shows that an effective and comprehensive information security infrastructure is best developed within the framework of an information security architecture (ISA), given today's distributed nature of client/server computing. In the past, when systems were closed and proprietary, security wasn't as compelling a need as it is in today's open systems.

The book covers important ISA issues such as the nature of the organization, policies and standards, baselines and risk assessment, awareness and training, compliance, and more. An underlying message is that these components must work in concert to form a cohesive ISA. Hardware and software are ineffective if they are not integrated into the ISA.

A dominant theme throughout is that implementing security technologies requires an understanding not only of the technologies' return on investment to the organization but also of the risks and vulnerabilities related to these technologies. This ISA methodology gives security professionals an excellent method for achieving just that.

Given how important policy is to an ISA, the book has several appendices that include policies, procedures, and work plans. These provide a fine foundation upon which to build a security architecture.
0 of 1 people found the following review helpful
1.0 out of 5 stars Cover page is completely different than the inside content - I guess it must be a binding error. Feb. 17 2014
By Rishi Kul - Published on
Format:Hardcover|Verified Purchase
Outside - Information Security Architecture
Inside - Information and Communication Technologies in Healthcare
Incorrect Compilation of Hardcover and Content Pages
1 of 5 people found the following review helpful
1.0 out of 5 stars Unsubstatiated claim June 29 2011
By Vo Blinn - Published on
Book itself.
Tried to identify target audience and failed.
Executive summary does not help: 'The first section of this book
-- "Information Security Architecture" -- is designed to give the reader
an understanding of the necessity for and requirements of an integrated plan.'

Deducing: architecture is "an integrated plan".

Major concern is rather pompous title, while, in fact, book is about IS governance.
"Architecture" claim, IMO, is groundless;
"WHY AN ARCHITECTURE" section does not provide convincing explanation.
It might have been OK to do that back at times of 1st edition, ~2K,
when everything architecture was immature. Things have changed since.

Hence, rating: sans claiming architecture overarching scale,
it might turn out as decent governance guide.

[BTW, Reasonably good book on governance: KRAG BROTBY (ISBN 0470131187),
if you are looking for one.]

Editorial work.
More and more often good texts are spoiled by poor editorial work.
This book is no exception: terms are used before they are defined
(ex.: component owner;
there is a reference to the 1st edition: are we suppose to read that one first?).

Did someone proofread this: "individual responsible for the firewall product
should have been identified in the security organization and infrastructure"?
2 possibilities:
- if it sounds OK, then you might not be right person for editing;
- maybe, indeed, in the military personnel is infrastructure.

This is, of course, my very subjective opinion of architect, ISSP.

Look for similar items by category