Start reading Security in a Web 2.0+ World: A Standards-Based Approach on the free Kindle Reading App or on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here.

Deliver to your Kindle or other device

Enter a promotion code
or gift card
 
 
 

Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Sorry, this item is not available in
Image not available for
Color:
Image not available
 

Security in a Web 2.0+ World: A Standards-Based Approach [Kindle Edition]

Carlos Curtis Solari

Digital List Price: $50.00 What's this?
Print List Price: $50.00
Kindle Price: $40.00
You Save: $10.00 (20%)

Free Kindle Reading App Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.

To get the free app, enter your email address or mobile phone number.

Formats

Amazon Price New from Used from
Kindle Edition $40.00  
Hardcover $42.53  
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Book Description

Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust.

Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know how to make effective security policy decisions to engineers who design ICT systems – a guide to information security and standards in the Web 2.0+ era. It provides an understanding of IT security in the converged world of communications technology based on the Internet Protocol.

Many companies are currently applying security models following legacy policies or ad-hoc solutions. A series of new security standards (ISO/ITU) allow security professionals to talk a common language. By applying a common standard, security vendors are able to create products and services that meet the challenging security demands of technology further diffused from the central control of the local area network. Companies are able to prove and show the level of maturity of their security solutions based on their proven compliance of the recommendations defined by the standard.

Carlos Solari and his team present much needed information and a broader view on why and how to use and deploy standards. They set the stage for a standards-based approach to design in security, driven by various factors that include securing complex information-communications systems, the need to drive security in product development, the need to better apply security funds to get a better return on investment.

Security applied after complex systems are deployed is at best a patchwork fix. Concerned with what can be done now using the technologies and methods at our disposal, the authors set in place the idea that security can be designed in to the complex networks that exist now and for those in the near future. Web 2.0 is the next great promise of ICT – we still have the chance to design in a more secure path.

Time is of the essence – prevent-detect-respond!


Editorial Reviews

Review

"Hard-hitting stuff - and undeniable too." (CIO, June 2009)

From the Inside Flap

Security for a Web 2.0 world has become a necessity.  There is an overwhelming need for a better approach to implement appropriate information security controls. However, limited information is available on the importance of a consistent model for security supported by international standards; the business value is difficult to quantify and the topic tends to be mis-communicated between technicians and policy makers.

Security Standards for a Web 2.0+ World clearly demonstrates how existing security solutions are failing to provide secure environments and trust between users and among organizations. Bringing together much needed information, and a broader view on why and how to deploy the appropriate standards. This book supports a shift in the current approach to information security, allowing companies to develop more mature models and achieve cost effective solutions to security challenges.


Product Details

  • File Size: 1791 KB
  • Print Length: 273 pages
  • Page Numbers Source ISBN: 0470745754
  • Publisher: Wiley; 1 edition (April 20, 2010)
  • Sold by: Amazon Digital Services, Inc.
  • Language: English
  • ASIN: B003JTHYS0
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Lending: Enabled
  • Amazon Best Sellers Rank: #1,914,435 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?


Customer Reviews

There are no customer reviews yet.
5 star
4 star
3 star
2 star
1 star
Share your thoughts with other customers

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in
 


Look for Similar Items by Category