ISO27001 in a Windows Environment
Imagine auto racing where none of the pit crew did things in synchronicity. No driver would keep such a crew. Yet in the world of IT, many firms have staff administering Windows systems, each...
View ArticlePRAGMATIC Security Metrics: Applying Metametrics to Information Security
Like all books on metrics, early in the book in PRAGMATIC Security Metrics: Applying Metametrics to Information Security makes the statement that “you can't manage what you can't measure”. The authors...
View ArticleManaging Risk and Information Security: Protect to Enable
Risk management in the real world is not an easy endeavor. On one side, people use toilet seat covers thinking they do something, on the other side, millions of people smoke cigarettes, ignoring the...
View ArticleApplied Information Security: A Hands-on Approach
In Applied Information Security: A Hands-on Approach, authors David Basin, Patrick Schaller and Michael Schläpfer detail some of the labs exercises and texts that they used for courses they gave at ETH...
View ArticleLocked Down: Information Security for Lawyers
HadLocked Down: Information Security for Lawyers not been published by the American Bar Association (ABA) and 2 of its 3 authors not been attorneys; one would have thought the book is a reproach...
View ArticleChinese Information War: Espionage, Cyberwar, Communications Control and...
It’s said that truth is stranger than fiction, as fiction has to make sense. Had The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests...
View Article
More Pages to Explore .....