Paperback , pages. Published February 11th by Packt Publishing first published January 1st To see what your friends thought of this book, please sign up. To ask other readers questions about Enterprise Security , please sign up. Lists with This Book. This book is not yet featured on Listopia. Jan 06, Phil Wilkins rated it it was amazing. As an Enterprise Architect I took an interest in this book as an opportunity to validate my understanding of security and ensure in the design and guidance work that I do I am providing good insights and directions so that the application architects and developers are both ensuring good security practices and also asking the helpful information available to other teams such as IT Security, operational support and so on.
Enterprise Security: A Data-Centric Approach to Securing the Enterprise by Aaron Woody
The book has been overall very well written and extremely accessible to even As an Enterprise Architect I took an interest in this book as an opportunity to validate my understanding of security and ensure in the design and guidance work that I do I am providing good insights and directions so that the application architects and developers are both ensuring good security practices and also asking the helpful information available to other teams such as IT Security, operational support and so on.
The book has been overall very well written and extremely accessible to even those not versed in the dark arts of IT Security. Anyone in my position, or fulfilling a role as an application designer or product development manager would really benefit from this book. Even those on the business end of IT would probably benefit in terms of garnering an insight into what IT Security should be seeking to achieve and why they often appear to make lives more difficult I.
So why so helpful, well Aaron has explained the issues and challenges that need to be confronted in terms of Security from the perspective of the organisations key assets - mainly its data certainly the asset that is likely to cause most visible problems if compromised. Not only that the book presents a framework to help qualify and quantify the risks as a result device a justifiable approach to securing the data and most importantly make defensible cases for budget spend.
I have to admit that the 1st chapter that that introduces the initial step in the strategy was a bit of a struggle as it seemed to adopt and try to define a view of the world that felt a little too simplistic.
The truth is that this the 1st step in a journey, and in hindsight important - so stick with it. Once the basic framework is in place we start looking at tooling strategies and technologies to start facilitating security. The book addresses categories of product rather than specific solutions so the book isn't going to date too quickly.
The solution examination includes the pros and cons of their use e.
Find a copy in the library
Finally to really help the book comes with a rich set of appendices providing a raft of references to additional material that will help people translate principles into practice. To conclude, a little effort maybe needed to get you started but ultimately a well written, informative, information rich book on security. More detailed reviews at http: Jurian Druvi rated it it was amazing May 17, Michael rated it really liked it Feb 02, This book is a reference and guide for all levels of enterprise security programs that have realized that non-data centric security is no longer practical and new methods must be used to secure the most critical assets in the enterprise.
Sign up to our emails for regular updates, bespoke offers, exclusive discounts and great free content. Log in to your account. Not yet a member? Register for an account and access leading-edge content on emerging technologies. Find Ebooks and Videos by Technology Android. Packt Hub Technology news, analysis, and tutorials from Packt. News Become a contributor. Categories Web development Programming Data Security.
Subscription Go to Subscription. Title added to cart. Subscription About Subscription Pricing Login. Search for eBooks and Videos.
A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise. Are you sure you want to claim this product using a token? Aaron Woody February What do I get with a Packt subscription?
- Desires of the Heart.
- Enterprise Security: A Data-Centric Approach to Securing the Enterprise;
- Stay ahead with the world's most comprehensive technology and business learning platform.!
- Canister Of Evil!
- Kids : Kids Puzzle Book Medium Level.
- iTunes is the world's easiest way to organize and add to your digital media collection.!
What do I get with an eBook? What do I get with a Video?
Enterprise Security: A Data-Centric Approach to Securing the Enterprise
Learn more Add to cart. Book Description Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. Table of Contents Chapter 1: Security As a Process. The Human Element of Security. What You Will Learn Enterprise information security challenges and roadmap to success Data-centric security architecture Applying security through policies, standards, and processes Basics of risk analysis, deciding what is valuable and needs to be secured Layered security approach from data to network edge Securing wireless implementations Managing the human element of security through awareness Security monitoring and incident management Learn sample forms and process flows for quick and easy use.
Aaron Woody is an expert in information security with over 15 years of experience across several industry verticals. His experience includes securing some of the largest enterprises in the world. Currently, he is a Security Consultant in the public sector. He is also a speaker and active instructor teaching hacking and forensics, and maintains a blog n00bpentesting. He will be launching a companion website http: