• List Price: CDN$ 142.57
  • You Save: CDN$ 32.47 (23%)
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Information Security Arch... has been added to your Cart
+ CDN$ 6.49 shipping
Used: Very Good | Details
Sold by Nearfine
Condition: Used: Very Good
Comment: Gently used. Expect delivery in 2-3 weeks.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition Hardcover – Dec 28 2005

See all 3 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
"Please retry"
CDN$ 110.10
CDN$ 70.00 CDN$ 69.99

Save An Additional 10% on Textbooks When you Join Amazon Student
click to open popover

Special Offers and Product Promotions

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Product Details

  • Hardcover: 424 pages
  • Publisher: Auerbach Publications; 2 edition (Jan. 13 2006)
  • Language: English
  • ISBN-10: 0849315492
  • ISBN-13: 978-0849315497
  • Product Dimensions: 16.4 x 2.7 x 23.6 cm
  • Shipping Weight: 612 g
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #1,331,757 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 3.2 out of 5 stars 5 reviews
5.0 out of 5 stars Used for Doctoral Research April 9 2013
By Archie Harville - Published on Amazon.com
Format: Kindle Edition Verified Purchase
Book was recommended by instructor. The only this is that it is has been a few years since it was published and needs an update. It is truly a great resource.
5.0 out of 5 stars quality April 14 2014
By Pansy Caldwell - Published on Amazon.com
Format: Hardcover Verified Purchase
This book was for school. It cost me almost nothing and was just like a brand new book. It was much cheaper than it would have cost me through my school.
4 of 7 people found the following review helpful
4.0 out of 5 stars Book is a good foundation upon which to build a security architecture Jan. 31 2007
By Ben Rothke - Published on Amazon.com
Format: Hardcover
Architecture is the art and science of designing buildings and other structures. Using some creative license, it also encompasses the design of any entity, including information systems and their security components. But while no one would build a building without an architect, IT departments routinely design computer systems without considering the security architecture, instead believing that firewalls and other devices are quick and durable fixes.

Nothing could be further from the truth. In Information Security Architecture, author Jan Killmeyer Tudor shows that an effective and comprehensive information security infrastructure is best developed within the framework of an information security architecture (ISA), given today's distributed nature of client/server computing. In the past, when systems were closed and proprietary, security wasn't as compelling a need as it is in today's open systems.

The book covers important ISA issues such as the nature of the organization, policies and standards, baselines and risk assessment, awareness and training, compliance, and more. An underlying message is that these components must work in concert to form a cohesive ISA. Hardware and software are ineffective if they are not integrated into the ISA.

A dominant theme throughout is that implementing security technologies requires an understanding not only of the technologies' return on investment to the organization but also of the risks and vulnerabilities related to these technologies. This ISA methodology gives security professionals an excellent method for achieving just that.

Given how important policy is to an ISA, the book has several appendices that include policies, procedures, and work plans. These provide a fine foundation upon which to build a security architecture.
2 of 6 people found the following review helpful
1.0 out of 5 stars Unsubstatiated claim June 29 2011
By Vo Blinn - Published on Amazon.com
Format: Hardcover
Book itself.
Tried to identify target audience and failed.
Executive summary does not help: 'The first section of this book
-- "Information Security Architecture" -- is designed to give the reader
an understanding of the necessity for and requirements of an integrated plan.'

Deducing: architecture is "an integrated plan".

Major concern is rather pompous title, while, in fact, book is about IS governance.
"Architecture" claim, IMO, is groundless;
"WHY AN ARCHITECTURE" section does not provide convincing explanation.
It might have been OK to do that back at times of 1st edition, ~2K,
when everything architecture was immature. Things have changed since.

Hence, rating: sans claiming architecture overarching scale,
it might turn out as decent governance guide.

[BTW, Reasonably good book on governance: KRAG BROTBY (ISBN 0470131187),
if you are looking for one.]

Editorial work.
More and more often good texts are spoiled by poor editorial work.
This book is no exception: terms are used before they are defined
(ex.: component owner;
there is a reference to the 1st edition: are we suppose to read that one first?).

Did someone proofread this: "individual responsible for the firewall product
should have been identified in the security organization and infrastructure"?
2 possibilities:
- if it sounds OK, then you might not be right person for editing;
- maybe, indeed, in the military personnel is infrastructure.

This is, of course, my very subjective opinion of architect, ISSP.
0 of 2 people found the following review helpful
1.0 out of 5 stars Cover page is completely different than the inside content - I guess it must be a binding error. Feb. 17 2014
By R Cool - Published on Amazon.com
Format: Hardcover Verified Purchase
Outside - Information Security Architecture
Inside - Information and Communication Technologies in Healthcare
Incorrect Compilation of Hardcover and Content Pages