Security De-Engineering

Regular price €84.99
Quantity:
Delivery/Collection within 10-20 working days
Shipping & Delivery
A01=Ian Tibble
advanced information risk mitigation
analyst
Author_Ian Tibble
Automated Vulnerability Scanners
Automated Vulnerability Scanning
Business Case
Category=UTF
Checklists and Standards Evangelists
cloud computing security
Computer Incident Response Team
corporate cybersecurity strategy
De-Engineering of Security
detection
eq_bestseller
eq_computing
eq_isMigrated=1
eq_isMigrated=2
eq_nobargain
eq_non-fiction
Hacker Ethic
identity management systems
Incident Response
Incident Response Strategy
information
Information Risk Management
Information Security
intrusion
IOS
Job Function
LDAP
malware attack prevention
management
Manual Penetration Testing
network intrusion analysis
Network Penetration Test
penetration
Penetration Testing
pros
risk
Security Analysts
Security De-Engineering
Security Products
Security Professional
Security Pros
Security Service Provider
Security Team
SIEM
SSH
Structured Query Language Injection
system
Tcp
testing
The Hackers
vulnerability assessment tools
Vulnerability Management

Product details

  • ISBN 9781439868348
  • Weight: 453g
  • Dimensions: 156 x 234mm
  • Publication Date: 13 Dec 2011
  • Publisher: Taylor & Francis Inc
  • Publication City/Country: US
  • Product Form: Paperback
Secure checkout Fast Shipping Easy returns

As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems impacting corporate information risk management. It explains what the problems are, how and why they have manifested, and outlines powerful solutions.

Ian Tibble delves into more than a decade of experience working with close to 100 different Fortune 500s and multinationals to explain how a gradual erosion of skills has placed corporate information assets on a disastrous collision course with automated malware attacks and manual intrusions. Presenting a complete journal of hacking feats and how corporate networks can be compromised, the book covers the most critical aspects of corporate risk information risk management.

  • Outlines six detrimental security changes that have occurred in the past decade
  • Examines automated vulnerability scanners and rationalizes the differences between their perceived and actual value
  • Considers security products—including intrusion detection, security incident event management, and identity management

The book provides a rare glimpse at the untold stories of what goes on behind the closed doors of private corporations. It details the tools and products that are used, typical behavioral traits, and the two types of security experts that have existed since the mid-nineties—the hackers and the consultants that came later. Answering some of the most pressing questions about network penetration testing and cloud computing security, this book provides you with the understanding and tools needed to tackle today’s risk management issues as well as those on the horizon.

Ian Tibble was an IT specialist with IBM Global Services before entering into the security arena. His experience of more than 11 years in information security allowed him to gain practical risk management expertise from both an architectural IT and a business analysis aspect. His experience in Infosec has been with service providers Trusecure (now Verizon) and PricewaterhouseCoopers, and also with end users in logistics, banking, and insurance. He has been engaged with security service delivery projects with close to 100 Fortune 500 companies and multinational financial institutions in Asia (Indonesia, Singapore, Malaysia, Taiwan, Hong Kong, and Australia) and Europe.

More from this author