Information Security

Defending the digital infrastructure

iSTOCK/GETTY IMAGES

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Secure Reads: The Security Risk Assessment Handbook

Read a quick review of The Security Risk Assessment Handbook.

Here are three security titles for your bookshelf. This month, we highlight risk assessment: The Security Risk Assessment Handbook
By Douglas J. Landoll
Auerbach Publications, 473 pages, $79.95

For those who want more than a how-to guide, this text gives security professionals an in-depth look into risk assessments, with sections on administrative, technical and physical data-gathering; risk analysis, mitigation and reporting; and steps to create a risk assessment.


Security Assessment: Case Studies for Implementing the NSA IAM
By Greg Miles, Russ Rogers, Ed Fuller, Matthew Paul Hoagberg, Ted Dykstra
Syngress, 429 pages, $69.95

In 1998, the National Security Agency's Information Assurance Methodology was introduced to standardize information security assessments under the Presidential Decision Directive 63. This book outlines the assessment process, offering definitions, answering concerns and creating a recommendation roadmap for organizations looking to implement this standard.


Network Security Assessment
By Chris McNab
O'Reilly, 371 pages, $39.95

"The best way to learn how to secure your systems is to attack them." This book features the tools, techniques and tricks used by government and military penetration testers to infiltrate systems. It offers how-tos on testing Windows services, Web apps, and services like SSH and DNS.


Visit SearchSecurity.com's Information Security Bookshelf for chapter downloads from popular security books.

Article 14 of 20

Dig Deeper on Penetration testing, ethical hacking and vulnerability assessments

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

Get More Information Security

Access to all of our back issues View All

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close