Skip to Content
Information Security Management Handbook, Volume 5, 6th Edition
book

Information Security Management Handbook, Volume 5, 6th Edition

by Micki Krause Nozaki, Harold F. Tipton
April 2016
Intermediate to advanced
558 pages
19h 52m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 5, 6th Edition
Whitelisting for Endpoint Defense ◾  13
Whitelisting works best in environments where end users are not normally allowed to install
applications and where there is a high degree of standardization among endpoints.
Requirement gathering and development is a must when evaluating whitelisting solutions.
About the Author
Rob Shein, CISSP, is a cyber security architect for HP. During the past 30 years—starting with
writing his first program at age 11—Rob has focused almost exclusively on security. His role at
HP has spanned the utility, outsourcing, financial, government, and manufacturing sectors in
the Americas and Asia. Rob’s areas of specialization range from policy work to penetration test-
ing, implementation/architecture, C2 systems, pure ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 7, 6th Edition

Information Security Management Handbook, Volume 7, 6th Edition

Richard O'Hanley, James S. Tiller
Physical Security and Safety

Physical Security and Safety

Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

Publisher Resources

ISBN: 9781439853467