Online Library TheLib.net » Cybersecurity operations handbook
cover of the book Cybersecurity operations handbook

Ebook: Cybersecurity operations handbook

00
27.01.2024
0
0
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements. • First book written for daily operations teams • Guidance on almost all aspects of daily operational security, asset protection, integrity management • Critical information for compliance with Homeland Security • Description


George Bernard Shaw, Mark Twain, and perhaps others have been credited with saying, "I didn't have time to write a short letter, so I wrote a long one instead." Perhaps the authors of this book were under the same time constraints, as their tome checks in at a massive 1,256 pages. For all its bulk and valuable reference information, however, it glaringly lacks operations-type material.

The first 19 chapters (and 700 pages) discuss technologies such as firewalls and VPNs. While these are well written, there is nothing here that hasn't been published before; all of the information is easily accessible via the Internet for free.

The final several hundred pages duplicate freely available government information. One is left wondering why the authors felt the need, for example, to include all 257 pages of the Federal Search and Seizure Manual here. Anyone can find it on the U.S. Department of Justice's Web site and search it electronically.

At $95, this book is a pricey substitute for information easily obtainable from the Web. While the information the book does contain is very good, it hardly justifies the price tag.

Download the book Cybersecurity operations handbook for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen