Full description not available
B**Z
Valuable ideas that you can leverage for greater security.
For myself the one thing more than anything else the author has missed is that the center of network and system security is always what and where is the data, where are the crown jewels? Its not that its not encompassed in the pages but for myself I think this is the one thing in security and in this book and most others that needs to be in plain English so it doesn't get lost. My other little quibble is the book has more material cited than a college text book and even though this is the correct way to do things its a little overwhelming. The last two chapters seem to be more forced on to the book rather than integrated but still worth a look. Still pointing out different resources and what can be gained and how it can be integrated is extremely helpful. Recommended but do have a little patience with the style, the material itself is well worth while!Overall I would certainly buy this book again, and it presents a wide scope of useful information, and the authors overall depth and considerations are solid. This book belongs in the library of anyone concerned with such a subject and network intelligence.
Trustpilot
2 weeks ago
1 month ago