Full description not available
G**E
Excellent read!
Mr Franke clearly explains a topic that is both considered fascinating by some, and dry by others. As a disclaimer, I fall on the former group. 🤓
A**.
Good Overview
I bought this book to have an overview of InfoSec in the real world, and I got that.The book describes various cybersecurity measures and gives real-world examples of security incidents.It is well-written and easy to read.
F**G
Recommended for business managers with non-IT skills
I thought about who ought to read this. It seems to me that the best audience would be business managers who have responsibility for IT security, but who don't presently have an IT skill set. Obviously, IT security is very important, and the consequences of an information security breach can range from a headache to devastation. Read the book and you'lll realize that IT security has human, software, hardware, operational and system elements that require close attention. As a manager, you're faced with what the author calls the "Defender's Dilemma" - you have to defend everything and the bad guys only have to find one point of attack. However, as the author says: if everything is a priority, then nothing is a priority.The book provides terminology, identifies weaknesses in managing your employees engagement with the internet, discusses software for defense and some weaknesses in the software, and organizes the defenses into a three-tier model so you can better decide what level of defense is currently best for your company. I believe that the book will give you a better understanding of what your IT professionals are telling you. If you try to digest the book's contents it may furnish you better questions for you to ask your IT group. It also suggests processes for dealing with events and incidents (these are different and the book goes into this). Incidents are much more serious.My copy of the book is only 98 pages, but it takes some focus. It has a few typos, but this isn't why I gave it 4 stars. While I expect that the author didn't want to be seen as recommending any particular software or product, I think the book could be improved if he at least made some suggestions of what products might meet a company's needs or at least where you might find these products. With this caveat, I recommend the book.
G**N
If you're totally new to the concepts its a good book to raise awareness like a college 101 course
Truly this is basic cyber security. If you're totally new to the concepts its a good book to raise awareness like a college 101 course. Don't expect to be able to run an Information Security Program after reading this book there are way too many areas of discipline to master not covered in this book.
A**S
The book is very easy to read and I was able to read the ...
I purchased this book so that I could refresh my cyber security skills. The book is very easy to read and I was able to read the entire book in two days. Great book!
S**
I would recommend that book to anyone who want to pursuing in cyber security
I like the fact the book tells you which step to take in every incident that could happen and also provide what to expect when you got a job as a cyber security.
J**E
Great for simple
Great for simple, quick, intuitive, yet comprehensive review of the concepts and recommendations. Don does a great job of explaining complex items in easy to understand language.
R**K
High level overview
Quick read for any one in security or just starting out.Provide high level aspects of security where more detailed conversations can begin notably when building security program or improving an existing one.Recommend as a quick reference for those outside IT.
TrustPilot
vor 4 Tagen
vor 1 Tag