Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
One PrOfeSSiOnal accreDitatiOn PrOgram 261
be carrying out risk assessments such as penetration tests and appli-
cation tests for new and existing projects and infrastructure. Other
functions can include vulnerability management, business continuity/
disaster recovery, wireless security, war dialing (there is a blast from
the past, perhaps not so applicable in some places), identity manage-
ment, incident response, and security awareness training.
e dierence between what security teams do these days and what
they should be doing is to a large degree about access to resources.
If security analysts are skilled IT professionals with accreditation to
prove it, there is no reason why they cannot have direct visibility of
policy compliance. at ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355