THE MAGAZINE

Defend I.T.: Security by Example

By Ben Rothke, CISSP

***** Defend I.T.: Security by Example. By Ajay Gupta and Scott Laliberte; published by Addison-Wesley Professional, 617/848-6000 (phone), www.awprofessional.com (Web); 384 pages; $34.99.

This aptly titled book uses plentiful real-world examples to bring the reader into the world of information security. Sixteen chapters present a panoply of actual computer security attacks, each followed by lessons learned.

Case studies come in five areas, from basic hacking to forensics. The book ably mixes introductory and technical material so that it succeeds at being useful without being inscrutable to nonexperts. The authors do, however, assume a basic level of network and security understanding. The case studies show what system and network administrators can do to protect their networks from the most common attacks.

Even at 320 pages, the book is easy to read. It is a well-written work that balances the competing extremes of generality and minutiae. Any network administrator looking for a boot-camp approach to network threats is advised to read this book of example problems. The point is to learn by example so as not to become one.


Reviewer: Ben Rothke, CISSP (Certified Information Systems Security Professional), is a security director with a financial services firm. He is a member of ASIS International.

Comments

 

The Magazine — Past Issues

 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.