Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
Other PrODuctS 245
rubbish. But how will the organization identify the good from the
bad? ey need an experienced security manager or architect to work
with security analysts (as opposed to IdM or SIEM consultants or
self-proclaimed “subject matter experts”) with deep technical skills to
look at the tech side of the products (as in do the products deliver what
is promised by the vendor, and what is the potential resource require-
ment for the company?), and then armed with the necessary tech info,
some thinking can be put into the business case. e security products
industry is only as big as it is because the aforementioned product
evaluation activities are rarely undertaken on the buying side of the
equation. e reason? e major theme in ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355