Get Free Shipping on orders over $79
Adaptive Security Management Architecture - James S. Tiller

Adaptive Security Management Architecture

By: James S. Tiller

Hardcover | 17 November 2010 | Edition Number 1

At a Glance

Hardcover


$263.00

or 4 interest-free payments of $65.75 with

 or 

Ships in 5 to 7 business days

For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovative and flexible. But increasingly pervasive threats mandate vigilance in unlikely areas. Adaptive Security Management Architecture enables security professionals to structure the best program designed to meet the complex needs of an entire organization, taking into account the organization's business goals as well as the surrounding controls, processes, and units already in existence.

Security aligned with business needs

Introducing the concept of Adaptive Security Management Architecture (ASMA), the book explains how an organization can develop an adaptive security program closely aligned to business needs, making it an enabling force that helps the organization achieve its goals and objectives. Describing how to achieve this adaptability, the book cites several examples and concepts to demonstrate aspects of managing change. It presents the end product of a successful security management system and examines the finer points of how it can be accomplished.

Risk management and governance

The book explores the security and business attributes that must be considered in the development of services and discusses the importance of consistency of management of services. In a section on risk management, the author explains how this important component is directly integrated with the ASMA model. He also discusses the critical element of governance and its importance to demonstrating value and ensuring effective adaptation. Lastly, the book examines how proper organizational management can give the executive and leadership team the necessary oversight to ensure the entire security program meets stated expectations. It also describes the capability maturity model, which ensures that all the co-dependent features of the program are managed with a common approach, thus ensuring that the organization and its security program function as a unified, cohesive system.

Industry Reviews
! readers of the book, have a great chance to learn professional structures and program designs ! . This book can be recommended for researchers and university students in information security systems. Also, engineers, security system designers, and developers will find in it interesting and useful ... . --Nicholas Sklavos, in Greece IEEE, April 2011, Vol. 2, No. 2

More in Computer Science

AI for Business : A Guide to AI Adoption - Jon Whittle

RRP $49.99

$40.75

18%
OFF
Microsoft 365 Excel For Dummies : For Dummies (Computer/Tech) - David H. Ringstrom
Microsoft 365 Excel All-in-One For Dummies : Excel for Dummies - David H. Ringstrom
Machine Learning For Dummies : For Dummies (Computer/Tech) - Luca Massaron
Creative Machines : AI, Art & Us - Maya Ackerman

RRP $57.95

$44.75

23%
OFF
New Beginnings : why change is so difficult and how to achieve it - Stefan Klein
The Tech Coup : How to Save Democracy from Silicon Valley - Marietje Schaake
The Shortest History of AI - Toby Walsh

RRP $27.99

$22.75

19%
OFF
Genesis : Artificial Intelligence, Hope, and the Human Spirit - Eric Schmidt
Artificial Intelligence : A Modern Approach, 4th Global Edition - Peter Norvig
Tiny Machine Learning : Design Principles and Applications - Agbotiname Lucky  Imoize
Python All-in-One For Dummies : 3rd Edition - Alan Simpson

RRP $74.95

$55.75

26%
OFF
Building Microservices : Designing Fine-Grained Systems 2nd Edition - Sam Newman
MRI in Practice : 5th Edition - Catherine Westbrook

RRP $82.95

$54.75

34%
OFF