Item description for Enterprise Security: IT Security Solutions: Concepts, Practical Experiences, Technologies by Walter Fumy...
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise. Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cryptographic techniques, intelligent tokens, public key infrastructures, IAM technologies) is provided. The book features detailed discussions of practical experiences in different sectors, including the automotive industry, financial services, e-health, and e-government.
Promise Angels is dedicated to bringing you great books at great prices. Whether you read for entertainment, to learn, or for literacy - you will find what you want at promiseangels.com!
Est. Packaging Dimensions: Length: 9.69" Width: 6.93" Height: 0.63" Weight: 1.32 lbs.
Release Date Mar 10, 2006
ISBN 389578267X ISBN13 9783895782671
Availability 0 units.
More About Walter Fumy
DR WALTER FUMY is Vice President Security Technology at Siemens Communications, where he is responsible for overseeing research and development in the area of I&C security which includes to select and/or develop advanced solutions, to partner with best-in-class technology providers, and to monitor and/or influence appropriate standards bodies and forums. He has published numerous papers and several books, and is a frequent speaker at conferences and events. Since 1997 Fumy is Chairman of ISO committee SC 27 "IT Security Techniques." He is also chairing the German BITKOM's Group on Security Management.
PROF JOERG SAUERBREY is Vice President Product Management for IT security solutions at Siemens Communications. He is responsible for own products, partner products and services for the worldwide IT security solutions business. In 1992 he has been awarded with the annual price of the ITG (German Information Technology Association). Since 2001 he is Honorary Professor for IT security at Technical University Munich, Germany. He has published numerous papers and a book, gives lectures, and is a frequent speaker at conferences and events.
Walter Fumy has an academic affiliation as follows - Berlin Siemens Communications Berlin Siemens Communications Berlin Ber.
Reviews - What do customers think about Enterprise Security: IT Security Solutions: Concepts, Practical Experiences, Technologies?
Security Review Jun 11, 2007
This book gives a good theoretical overview on the topic. It is short, though, on actual practical real-world solutions in the IAM space.
Solid book for infosec consultants Aug 14, 2006
This book has the look and feel of a business school textbook, moving from topic to topic in a fairly academic matter. It is a combination of 14 essays from prominent authors in the topics they are writing on. This allows for a book that can treat a wide range of concepts and still maintain credibility and a tone of expertise with the downside being the structure of each essay is slightly different between authors. As such, it is meant more as a higher-level introduction to concepts and ideas that swirl around the information security industry but it is couched in the language of business in the hopes that enterprises will adopt a measure of culture change in the area of security. The book seems to have a more European focus, but it is not without value to an American audience.
The book begins with an introduction by the editors laying out what they view as three areas driving enterprise security and what they hope to accomplish with the book. They finger security threats, creating new business opportunities, and regulatory compliance as the main drivers of security investment for the enterprise. In their experience, the editors see businesses still creating processes and applications designed around speed and convenience with security being an afterthought. The editors then establish 4 items they wish to see changed in industry: review of information security requirements, assuming legal liability for poor security practices (it'll never happen), creating a security-aware culture, and security against insider threats. The rest of the book doesn't seem to truly address how to bring these four changes to fruition.
The rest of the book is divided into three sections: (1) Concepts & Trends (better described as emerging security technologies), (2) Practical Experiences, and (3) Technologies & Standards. As far as organization, it would seem better to have Practical Experiences come last in the book and address the technologies discussed previously; however this is not a serious deficiency in the book.
Parts 1 and 3 are presented to the reader from a high-level perspective. It assumes little prior technical knowledge and thus is accessible to a wide audience, particularly the business community. It helps the reader understand why these technologies are beneficial from an economic standpoint. Readers who are technically savvy may get easily bored from this section unless they are trying to develop a "business case" for the adoption of security mechanisms for their organization. In that regard, these essays help bridge the gap between "tech heads" and the "pointy-haired management".
The Practical Experience section is a collection of four case studies of four different organizations facing four different problems. It helps the reader to understand the challenges and obstacles in actual implementation of technologies. It helps bridge the gap between book-learning and real-world experience. 3 of the 4 essays revolve around PKI and digital identities. It is clear based on the focus of the editors that authentication is important to them, however and expansion of case studies based on their other goals would make the text that much more effective.
All in all, the book is a valuable primer for consultants and non-savvy managers who are seeking to get their minds around security and how best to sell the investment of security.