Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
checkliStS anD StanDarDS evangeliStS 57
holes—but generally, operations teams cannot be expected to know
enough about security to eciently meet the challenges in security by
themselves (I will talk about this point in more detail in Chapter 4).
Network operations sta told me they learned a great deal from the
security program, and from that point on, whenever they were planning
changes in infrastructure, they would come to security rather than the
usual situation wherein security has to chase other teams, who over the
years had become experts in security department evasion tactics.
IT operations were at rst a very dicult team to deal with mainly
because there was a mistrust that came from several years of security
teams just blocking ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355