Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Buy Used
+ $3.99 shipping
Used: Very Good | Details
Condition: Used: Very Good
Comment: Very good condition - book only shows a small amount of wear. Biggest little used bookstore in the world.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Securing Business Information: Strategies to Protect the Enterprise and Its Network Hardcover – January 30, 2002

4.0 out of 5 stars 2 customer reviews

See all 2 formats and editions Hide other formats and editions
New from Used from
"Please retry"
$11.92 $0.97

click to open popover

Editorial Reviews

From the Back Cover

Securing Business Information provides an approach to security that is derived from numerous successful implementations. The Enterprise Security Plan (ESP) is a six-step process for tailoring enterprise security techniques to the needs of your business.

This book will guide you through these steps to secure your computing infrastructure within the constraints of normal business operations, resources, and today's technology:

  • Prepare the enterprise, starting with the staff and their roles.
  • Organize a group of security domains and assess the tolerable amount of risk for each.
  • Complete a baseline security analysis and derive a set of guiding policies.
  • Determine how security policies are being enforced throughout the enterprise.
  • Identify gaps and set priorities.
  • Plan the projects to implement an appropriately secure enterprise.


About the Author

F. CHRISTIAN BYRNES leads Meta Group's security coverage. He is the author of Security in Enterprise Computing: A Practical Guide. In recognition of his expertise in intellectual property concerns, he was appointed to the US Congress advisory committee that produced an extensive report to guide congress in planning future laws. Mr. Byrnes was CEO at Centrax Corporation, a security software vendor acquired by CyberSafe.

Dale Kutnick is the cofounder, CEO, and chairman of the board of META group, overseeing all of the company's research and analytical activities. Prior to cofounding META Group in 1989, Mr. Kutnick was executive vice president of research at Gartner Group. Previously, he was executive director and a principal at Yankee Group, and a principal at Battery Ventures, a venture capital firm.


New York Times best sellers
Browse the New York Times best sellers in popular categories like Fiction, Nonfiction, Picture Books and more. See more

Product Details

  • Series: IT Best Practices
  • Hardcover: 256 pages
  • Publisher: Addison-Wesley Professional; 1st edition (January 30, 2002)
  • Language: English
  • ISBN-10: 020176735X
  • ISBN-13: 978-0201767353
  • Product Dimensions: 7.3 x 0.8 x 9.6 inches
  • Shipping Weight: 1.3 pounds
  • Average Customer Review: 4.0 out of 5 stars  See all reviews (2 customer reviews)
  • Amazon Best Sellers Rank: #10,079,625 in Books (See Top 100 in Books)

Customer Reviews

5 star
4 star
3 star
2 star
1 star
See both customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Hardcover
Of all the security books I've read this one stands out as the best for two reasons: (1) it lays out what is needed and the steps to take to develop an enterprise security policy in a clear, logical sequence, and (2) there no gaps in the proposed process. Indeed, it appears that the authors had 'due diligence' as their foremost principle when they wrote this book. In addition their experience is evident by the way they approach the subject and tie it together.
The approach is straightforward: initiate, assess, gather requirements, perform a gap analysis, develop a baseline and implement. What makes the approach unique is the 'divide and conquer technique that partitions the business into security domains. This has benefits beyond decomposing the complexities of enterprise security into manageable pieces - it can also be linked into enterprise problem management and business continuity planning processes because you're forced to examine your resources and systems, and to prioritize them according to their criticality. I also liked the discussion of policies, which discussed the merits of identity-based and role-based approaches, and included excellent advice on policy auditing. One strong point about this section was the treatment of finding documented *and* undocumented policies. This material is applicable to anyone who is involved in policies and procedures development, regardless of whether or not it's related to security. I also especially liked the chapter on trust modeling. This is one area where I learned much from the book.
I've only touched upon key elements of this book.
Read more ›
Comment 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Hardcover Verified Purchase
The authors took a unique "marketing approach" to enterprise security. I believe it is correct in theory, yet difficult in practice. The reason: unless security is at a "strategic" position in your company/industry (that is, doing security good will let you beat competitor ...), you can't get users' attention! And a marketing campaign with little attention can't get you anywhere.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Pages with Related Products. See and discover other items: computing