tailieunhanh - Enemy at the Water Cooler

.Praise for Enemy at the Water Cooler “Brian Contos has created what few security specialists can claim: a truly readable book about the threats to our businesses from insiders who know how to attack the critical components of modern business, the computers, applications and networks that make it all work. During the last fifteen years we have witnessed incredible strides in network centric business processes that have spawned the productivity of our workforce and the globalization of our supply chains. All of this progress is based on Information Technology advances that connect people and processes together to achieve more than our. | synỆress1 4 FREE BOOKLETS ạ FREE YOUỀ SOLUTIONS 4 Vecoutr Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures Mcrny Ct the iMff c k b 3 mult C3d for CXh 3rd security officers everywhere - -Wilum p. Crowd former Deputy Director of the Nâtkxul Security Agency Brian T. Contos CISSP Praise for Enemy at the Water Cooler Brian Contos has created what few security specialists can claim a truly readable book about the threats to our businesses from insiders who know how to attack the critical components of modern business the computers applications and networks that make it all work. During the last fifteen years we have witnessed incredible strides in network centric business processes that have spawned the productivity of our workforce and the globalization of our supply chains. All of this progress is based on Information Technology advances that connect people and processes together to achieve more than our traditional approaches would have ever allowed. With these substantial changes we have become increasingly dependent on IT systems for business success and with that dependence we have also become increasingly vulnerable to threats to those systems. During this revolution security has been viewed as costly highly technical and something that is attended to by a small cadre in the back room. It has also been largely viewed as keeping the hordes of attackers and hackers out of the corporate network at the perimeter. In this book we come to see that the insider poses a really significant threat and Contos punctuates this point with compelling case studies that make the threats come alive for the reader. Brian has not only made these threats understandable for any corporate player in the management team he has also made it clear that a well constructed set of defenses requires that the entire corporation or agency become involved in defining the threats and knowing how to spot them in the business processes. Enemy at the Water Cooler

TỪ KHÓA LIÊN QUAN