Qty:1
  • List Price: $104.95
  • Save: $30.81 (29%)
Only 3 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
FREE Shipping on orders over $35.
Used: Good | Details
Sold by Prime1
Condition: Used: Good
Comment: The cover has visible markings and wear. Pages show normal wear. All shipping handled by Amazon. Prime eligible when you buy from us!
Access codes and supplements are not guaranteed with used items.
Add to Cart
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition Hardcover – January 13, 2006

ISBN-13: 978-0849315497 ISBN-10: 0849315492 Edition: 2nd

Buy New
Price: $74.14
21 New from $39.97 34 Used from $2.25
Rent from Amazon Price New from Used from
eTextbook
"Please retry"
$21.95
Hardcover
"Please retry"
$74.14
$39.97 $2.25

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition + Enterprise Security Architecture: A Business-Driven Approach + An Introduction To Enterprise Architecture: Third Edition
Price for all three: $161.65

Buy the selected items together

Customers Who Bought This Item Also Bought

NO_CONTENT_IN_FEATURE
Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Hardcover: 424 pages
  • Publisher: Auerbach Publications; 2 edition (January 13, 2006)
  • Language: English
  • ISBN-10: 0849315492
  • ISBN-13: 978-0849315497
  • Product Dimensions: 9.4 x 6.3 x 1.2 inches
  • Shipping Weight: 1.4 pounds (View shipping rates and policies)
  • Average Customer Review: 3.2 out of 5 stars  See all reviews (5 customer reviews)
  • Amazon Best Sellers Rank: #1,267,411 in Books (See Top 100 in Books)

Customer Reviews

3.2 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

By Pansy Caldwell on April 14, 2014
Format: Hardcover Verified Purchase
This book was for school. It cost me almost nothing and was just like a brand new book. It was much cheaper than it would have cost me through my school.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Kindle Edition Verified Purchase
Book was recommended by instructor. The only this is that it is has been a few years since it was published and needs an update. It is truly a great resource.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 7 people found the following review helpful By Ben Rothke on January 31, 2007
Format: Hardcover
Architecture is the art and science of designing buildings and other structures. Using some creative license, it also encompasses the design of any entity, including information systems and their security components. But while no one would build a building without an architect, IT departments routinely design computer systems without considering the security architecture, instead believing that firewalls and other devices are quick and durable fixes.

Nothing could be further from the truth. In Information Security Architecture, author Jan Killmeyer Tudor shows that an effective and comprehensive information security infrastructure is best developed within the framework of an information security architecture (ISA), given today's distributed nature of client/server computing. In the past, when systems were closed and proprietary, security wasn't as compelling a need as it is in today's open systems.

The book covers important ISA issues such as the nature of the organization, policies and standards, baselines and risk assessment, awareness and training, compliance, and more. An underlying message is that these components must work in concert to form a cohesive ISA. Hardware and software are ineffective if they are not integrated into the ISA.

A dominant theme throughout is that implementing security technologies requires an understanding not only of the technologies' return on investment to the organization but also of the risks and vulnerabilities related to these technologies. This ISA methodology gives security professionals an excellent method for achieving just that.

Given how important policy is to an ISA, the book has several appendices that include policies, procedures, and work plans. These provide a fine foundation upon which to build a security architecture.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
0 of 1 people found the following review helpful By Rishi Kul on February 17, 2014
Format: Hardcover Verified Purchase
Outside - Information Security Architecture
Inside - Information and Communication Technologies in Healthcare
Incorrect Compilation of Hardcover and Content Pages
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 5 people found the following review helpful By Vo Blinn on June 29, 2011
Format: Hardcover
Book itself.
Tried to identify target audience and failed.
Executive summary does not help: 'The first section of this book
-- "Information Security Architecture" -- is designed to give the reader
an understanding of the necessity for and requirements of an integrated plan.'

Deducing: architecture is "an integrated plan".

Major concern is rather pompous title, while, in fact, book is about IS governance.
"Architecture" claim, IMO, is groundless;
"WHY AN ARCHITECTURE" section does not provide convincing explanation.
It might have been OK to do that back at times of 1st edition, ~2K,
when everything architecture was immature. Things have changed since.

Hence, rating: sans claiming architecture overarching scale,
it might turn out as decent governance guide.

[BTW, Reasonably good book on governance: KRAG BROTBY (ISBN 0470131187),
if you are looking for one.]

Editorial work.
More and more often good texts are spoiled by poor editorial work.
This book is no exception: terms are used before they are defined
(ex.: component owner;
there is a reference to the 1st edition: are we suppose to read that one first?).

Did someone proofread this: "individual responsible for the firewall product
should have been identified in the security organization and infrastructure"?
2 possibilities:
- if it sounds OK, then you might not be right person for editing;
- maybe, indeed, in the military personnel is infrastructure.

This is, of course, my very subjective opinion of architect, ISSP.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search