Full description not available
A**.
Good Overview
I bought this book to have an overview of InfoSec in the real world, and I got that.The book describes various cybersecurity measures and gives real-world examples of security incidents.It is well-written and easy to read.
J**E
Great for simple
Great for simple, quick, intuitive, yet comprehensive review of the concepts and recommendations. Don does a great job of explaining complex items in easy to understand language.
F**G
Recommended for business managers with non-IT skills
I thought about who ought to read this. It seems to me that the best audience would be business managers who have responsibility for IT security, but who don't presently have an IT skill set. Obviously, IT security is very important, and the consequences of an information security breach can range from a headache to devastation. Read the book and you'lll realize that IT security has human, software, hardware, operational and system elements that require close attention. As a manager, you're faced with what the author calls the "Defender's Dilemma" - you have to defend everything and the bad guys only have to find one point of attack. However, as the author says: if everything is a priority, then nothing is a priority.The book provides terminology, identifies weaknesses in managing your employees engagement with the internet, discusses software for defense and some weaknesses in the software, and organizes the defenses into a three-tier model so you can better decide what level of defense is currently best for your company. I believe that the book will give you a better understanding of what your IT professionals are telling you. If you try to digest the book's contents it may furnish you better questions for you to ask your IT group. It also suggests processes for dealing with events and incidents (these are different and the book goes into this). Incidents are much more serious.My copy of the book is only 98 pages, but it takes some focus. It has a few typos, but this isn't why I gave it 4 stars. While I expect that the author didn't want to be seen as recommending any particular software or product, I think the book could be improved if he at least made some suggestions of what products might meet a company's needs or at least where you might find these products. With this caveat, I recommend the book.
W**D
Security Professional
Great book for security professoonal and the author introduced the right domain of CISSP. Great read and well recommended.
A**S
The book is very easy to read and I was able to read the ...
I purchased this book so that I could refresh my cyber security skills. The book is very easy to read and I was able to read the entire book in two days. Great book!
I**
Steps to follow to document the process of securing my organization's endpoints
Good and spot on
G**E
Excellent read!
Mr Franke clearly explains a topic that is both considered fascinating by some, and dry by others. As a disclaimer, I fall on the former group. 🤓
R**K
High level overview
Quick read for any one in security or just starting out.Provide high level aspects of security where more detailed conversations can begin notably when building security program or improving an existing one.Recommend as a quick reference for those outside IT.
Trustpilot
1 month ago
3 days ago