Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
148 Security De-engineering
because the document that describes the regulation is usually publicly
available and anyone can read it. Surely the real challenge of compli-
ance is in the IT challenges faced by security and IT—and the security
skill set required to meet this challenge cannot really be generalized
any more than “security.” A security expert (with some management
guidance) who can speak the language of IT and actually work eec-
tively with other IT departments is the person needed to ll this role.
However, in practice, the candidate who can demonstrate knowledge
of privacy regulations is more likely to get the job as compared with an
analyst who has broad IT and practical security experience.
e same can be said with the Payment ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355