The book essentially describes the McCumber Cube information security methodology. And the McCumber Cube methodology is indeed interesting and worth the read. Unfortunately, the author wrote around it a whole book! In the first part the author describes the bases on the information security and rel
Assessing and Managing Security Risk in IT Systems: A Structured Methodology
β Scribed by John McCumber
- Publisher
- Auerbach Publications
- Year
- 2004
- Tongue
- English
- Leaves
- 476
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The book essentially describes the McCumber Cube information security methodology.
And the McCumber Cube methodology is indeed interesting and worth the read.
Unfortunately, the author wrote around it a whole book!
In the first part the author describes the bases on the information security and relates it to the McCumber Cube (without really describing what the Cube is! Luckily, the hardcover has a picture of it.)
In the second part he dwelves in a little more detail of the McCumber Cube methodology, repeating again and again the same concepts, just with slight viewpoint variations.
Obviously his methodology is described as superior to any other methodology! While he makes a few good points, often he just states this without really comparing it to the other technologies.
Worth the read if you have time to spare... it indeed has a few interesting ideas and viewpoints.
If only they were expressed in a tenth of the space!
π SIMILAR VOLUMES
<p><p>The book provides a comprehensive analysis from mathematical, legal and financial perspectives on the pricing of hybrids.</p></p>
Examining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing
<p><i>Security Risk Assessment</i> is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. </p> <p>A good security assessment is a fact-finding process that determines an organization's state of security protection. It expose
<p><i>Security Risk Assessment</i> is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. </p><p>A good security assessment is a fact-finding process that determines an organizationβs state of security protection. It exposes