Blog Posts Tagged with "Book Review"

3e35900ae6facc6c146a85c435c71d82

CERT Resilience Management Model (RMM)

June 09, 2011 Added by:Ben Rothke

The model has two primary objectives: the convergence of operational risk and resilience management such as security, business continuity, and aspects of IT operations management into a single model, and to apply a process improvement approach to operational resilience management..

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Computer Incident Response and Product Security

January 31, 2011 Added by:shawn merdinger

Having a team and process in place to handle incoming vulnerability reports from external sources is a sign of vendor maturity. Not having either can quite likely result in a vendor having a "zero day" vulnerability and proof-of-concept exploit published on a public mailing list...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Security Information and Event Management Implementation

January 25, 2011 Added by:Anton Chuvakin

The book has unfortunate signs of being written by a team of others who didn’t talk to each other. Despite the promises of implementation guidance, it leaves some of the very complex SIEM issues untouched – and even unmentioned. Also, it is much stronger on the “what” then on “how"...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

CyberForensics: Understanding Infosec Investigations

January 06, 2011 Added by:Ben Rothke

The book takes a broad look at cyberforensics with various case studies. Each of the books 10 chapters takes a different approach to the topic, and is meant to be a source guide to the core ideas on cyberforensics...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »