Full description not available
F**E
Easy to digest basics and fundamentals on Cyber security
I have been an Infosec Auditor for a few years and found this book to be invaluable as a go-to reference guide.
D**H
Excellent read
Gives a good overview of the fundamental requirements on building a cyber defence organisation. From a beginner view point is an excellent starting point.
L**S
Very Informative for Beginners
Very Informative, recently became interested in Cyber Security and have definitely found this book interesting and engaging whilst still being very informative.
A**I
Three Stars
good as introduction to
B**Z
Keep up with your CS - Cyber Security
Not bad for beginners in CS good read quite scary how easy it can be to get hacked etc.
T**T
Good day intro to cyber
A good idea intro to cyberI felt it was easy to follow
J**N
Good reference book
Bought this book whilst studying for my MSc in computer networking and cybersecurity. It was an excellent quick reference book. When your loaded down with information, having a quick reminder is invaluable. Though prior knowledge of networks and security maybe required.
I**N
Five Stars
Easy to read and very informative. Well worth the read.
A**N
One of the best Security books
One of the best book for beginnersVery organized parts.
G**E
Excellent read!
Mr Franke clearly explains a topic that is both considered fascinating by some, and dry by others. As a disclaimer, I fall on the former group. 🤓
N**A
Good for learning basics
A good read for a price. if you are a beginner I would recommend it. If you have some prior knowledge it would be better to look for another read.
A**.
Good Overview
I bought this book to have an overview of InfoSec in the real world, and I got that.The book describes various cybersecurity measures and gives real-world examples of security incidents.It is well-written and easy to read.
F**G
Recommended for business managers with non-IT skills
I thought about who ought to read this. It seems to me that the best audience would be business managers who have responsibility for IT security, but who don't presently have an IT skill set. Obviously, IT security is very important, and the consequences of an information security breach can range from a headache to devastation. Read the book and you'lll realize that IT security has human, software, hardware, operational and system elements that require close attention. As a manager, you're faced with what the author calls the "Defender's Dilemma" - you have to defend everything and the bad guys only have to find one point of attack. However, as the author says: if everything is a priority, then nothing is a priority.The book provides terminology, identifies weaknesses in managing your employees engagement with the internet, discusses software for defense and some weaknesses in the software, and organizes the defenses into a three-tier model so you can better decide what level of defense is currently best for your company. I believe that the book will give you a better understanding of what your IT professionals are telling you. If you try to digest the book's contents it may furnish you better questions for you to ask your IT group. It also suggests processes for dealing with events and incidents (these are different and the book goes into this). Incidents are much more serious.My copy of the book is only 98 pages, but it takes some focus. It has a few typos, but this isn't why I gave it 4 stars. While I expect that the author didn't want to be seen as recommending any particular software or product, I think the book could be improved if he at least made some suggestions of what products might meet a company's needs or at least where you might find these products. With this caveat, I recommend the book.
Trustpilot
3 days ago
4 days ago