Buy Used
CDN$ 2.80
+ CDN$ 6.49 shipping
Used: Good | Details
Condition: Used: Good
Comment: Ships from the USA. Please allow 2 to 3 weeks for delivery. Light shelf wear and minimal interior marks. Millions of satisfied customers and climbing. Thriftbooks is the name you can trust, guaranteed. Spend Less. Read More.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

The Secured Enterprise: Protecting Your Information Assets Paperback – Feb 28 2002

4.0 out of 5 stars 1 customer review

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Paperback
"Please retry"
CDN$ 16.95 CDN$ 2.80

Harry Potter and the Cursed Child
click to open popover

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.




Product Details

  • Paperback: 336 pages
  • Publisher: Prentice Hall; 1 edition (Feb. 28 2002)
  • Language: English
  • ISBN-10: 013061906X
  • ISBN-13: 978-0130619068
  • Product Dimensions: 17.5 x 2.3 x 23.6 cm
  • Shipping Weight: 621 g
  • Average Customer Review: 4.0 out of 5 stars 1 customer review
  • Amazon Bestsellers Rank: #3,758,036 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

From the Inside Flap

Introduction:How to Read this Book

This book is directed to business people who are tasked with computer security responsibility, but it will also have value to security professionals looking for an overview. As such, security is viewed from a business perspective throughout the book. Topics are explored in a variety of technical depths to explain fully the impact on business and to give business professionals sufficient understanding to work effectively with their technical people. Whether you think of it as information technology (IT), information services (IS), or just the computer people, without a competent guide, security can go right over your head.

This book is divided into four sections.

Part 1—Introduction

This section introduces you to security, the threats you are protecting yourself from, and the basic technologies you will need to protect yourself.

Part 2—Protection Methods

This section explains the protection methods used commonly in today's business environment. This is where you will read about firewalls, virus protection, intrusion detection, etc.

Part 3—Implementation

This section focuses on implementation methods and choices for different sizes of businesses. In Part 3, you will read about risk assessment, configuration, deployment, and managed security services.

Part 4—Odds and Ends

This section includes discussions of legal issues, company politics, and other factors necessary in your success with information security.

To help you, the authors have provided plenty of examples, anecdotes, and technical descriptions to guide you.The authors understand that businesses are not created equal. To accommodate different sizes of businesses, we offer the following guides to help you find the information relevant to your situation.Large Enterprise

A large enterprise is one with more than 1,000 servers, more than $1 billion in revenue, and more than 2,000 employees. Large enterprises are usually characterized by multiple worldwide sites and special requirements, such as "follow the sun" management. Large enterprises will likely require more security expertise than is offered in this book.

Medium Business

Medium-sized businesses have over $100 million in revenue, more than 100 servers, and over 500 employees. Medium businesses usually have multiple sites. This book will be especially useful to executives and managers of medium-sized businesses.

Small Business

A small business has less than $100 million in revenue, fewer than 100 servers, and fewer than 100 employees. Although most of the information in this book will have value to small businesses, some of it may be more than is necessary.

Security is a journey, not a destination. There will not be a point in this journey when you can say, "Now I'm secure." This book will be your road map.

From the Back Cover

Securing your key digital and information assets in an age of insecurity.

Securing enterprise data, applications, and intellectual property has become THE critical issue for business decision-makers in this era of hackers and potential cyberterrorism. But until now, most books on information security have been written for programmers and networking professionals, not business people. The Secured Enterprise: Protecting Your Information Assets fills the gap, delivering a non-technical, business-focused briefing on every key aspect of information security: frompeople to process to technology.

  • A guide to today's security threats—including cyberterrorism
  • How to establish effective, realistic security policies
  • The tools for defending your information assets
  • Effective mechanisms for identification, authentication, and access control
  • What firewalls can—and cannot—do
  • Vulnerability scanners, virus detectors, and intrusion detection systems
  • Virtual private networks: leveraging the cost savings without exposing your data to risk
  • Securing B2B and B2C e-commerce
  • How to evaluate third-party security products and services
  • New security options for wireless applications
Security has gotten more complex with time, and it has become more difficult to distill it. After reading this book you will understand security better and be more prepared to apply it in your enterprise.

—Jeff Moss,
Founder, DEF CON President,
Black Hat, Inc.

See all Product Description

Customer Reviews

4.0 out of 5 stars
5 star
0
4 star
1
3 star
0
2 star
0
1 star
0
See the customer review
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
Those who like books such as Have You Locked the Castle Gate? Home and Small Business Computer Security [URL] and want to learn more will find The Secured Enterprise: Protecting Your Information Assets a good springboard for more information.
While the Castle Gate is more focused on the home and small business sector, The Secured Enterprise: Protecting Your Information Assets is geared for corporate technology managers who need to know more about information security.
Topics such as security ROI, policy, technologies, architecture and more are discussed. The book is written in an easy to use style and provides valuable information to those who need to know more about one of the most crucial area of information technology today - corporate information security.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: HASH(0xa7d6c450) out of 5 stars 3 reviews
4 of 4 people found the following review helpful
HASH(0xa7f78180) out of 5 stars Really good book for corporate information security June 27 2002
By Ben Rothke - Published on Amazon.com
Format: Paperback
Those who like books such as Have You Locked the Castle Gate? Home and Small Business Computer Security [URL] and want to learn more will find The Secured Enterprise: Protecting Your Information Assets a good springboard for more information.
While the Castle Gate is more focused on the home and small business sector, The Secured Enterprise: Protecting Your Information Assets is geared for corporate technology managers who need to know more about information security.
Topics such as security ROI, policy, technologies, architecture and more are discussed. The book is written in an easy to use style and provides valuable information to those who need to know more about one of the most crucial area of information technology today - corporate information security.
3 of 3 people found the following review helpful
HASH(0xa80cf594) out of 5 stars A bit outdated now, but concepts remain the same Feb. 8 2005
By David L. Quan - Published on Amazon.com
Format: Paperback
Much has changed since this book was first released a few years ago, but Proctor's writing still should be acknowledged. Many of the concepts expressed and explained in this book are still valid today, as is some of the technology as well. The sections on firewalls are especially worth noting, and the guidelines for developing policies remain equally important today.
HASH(0xa7f95108) out of 5 stars Four Stars July 7 2016
By Pedro J. Maldonado - Published on Amazon.com
Format: Paperback Verified Purchase
Economic and usefull


Feedback