Free Downloads
Hackers Vs. Security Pros: A Security Manager's Playbook (The CTO Playbook 1)

A comprehensive guide to managing Information Security program to defend against intruders and the threat of data breach in your organization. This book is a guide for Security Managers and CISOs to develop a security program for an organization of any size and industry. The concept of LEAN is introduced to build an efficient and effective program, and several management theories are discussed to have a strategic view for IT Security Management. Success stories and pitfalls of specific technologies such as Data Loss Prevention (DLP), Security Incident and Event Management (SIEM), Malware Prevention are also introduced.

File Size: 779 KB

Print Length: 120 pages

Publisher: Institute of Information Security (December 24, 2014)

Publication Date: December 24, 2014

Sold by:  Digital Services LLC

Language: English

ASIN: B00QD2FZWM

Text-to-Speech: Enabled

X-Ray: Not Enabled

Word Wise: Not Enabled

Lending: Not Enabled

Enhanced Typesetting: Not Enabled

Best Sellers Rank: #689,755 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #178 in Books > Computers & Technology > Security & Encryption > Viruses #654 in Books > Computers & Technology > Internet & Social Media > Hacking #11861 in Kindle Store > Kindle eBooks > Computers & Technology

This is a very comprehensive title that arms IT Security managers with a framework required to properly manage a security organization. Highly recommended.

Hackers vs. Security Pros: A Security Manager's Playbook (The CTO Playbook 1) The Ultimate Guide to WordPress Security: Secure and protect your WordPress website form hackers and protect your data, get up to date security updates Framing Floors Walls Ceilings (For Pros By Pros) Smart Business for Contractors: A Guide to Money and the Law (For Pros By Pros) Bathroom Remodeling (For Pros By Pros) Plumbing (For Pros By Pros) Framing Roofs (For Pros By Pros) Building with Masonry: Brick, Block & Concrete / For Pros by Pros Web Services, Service-Oriented Architectures, and Cloud Computing: The Savvy Manager's Guide (The Savvy Manager's Guides) System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager (SCCM) Unleashed The Government Manager's Guide to Source Selection (The Government Manager's Essential Library Book 2) CCM Certification Study Guide 2015-2016: Case Manager's Review Book for the Certified Case Manager Exam Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) Hackers & Painters: Big Ideas from the Computer Age Hackers and Painters: Big Ideas from the Computer Age Black Hat Python: Python Programming for Hackers and Pentesters Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics) Network Forensics: Tracking Hackers through Cyberspace Design for Hackers: Reverse Engineering Beauty