Full description not available
B**E
One of the best Security Architecture books available IMHO
Love this book. Older but still relevant.
J**.
Loved it. Both the totality of the deliverables and ...
Loved it. Both the totality of the deliverables and process but the best part is that these Brits can write exceptionally well. Less than ten grammatical errors in a 600 page book. And that may be from my US English POV. This book is for the Don Quixote who needs to collect and organize the security pieces, catalog them, refine them and take on a windmill. I hope you like going big because that's why you better have Bill Clinton's charisma, your going to need it. Hercules cleaned the stables. Good Luck!!
A**R
Pleasant and helpful reading
The book is very pleasant reading both for those who are native in the information security landscape and for those of us who have worked in the security field for a long time. The book gives good instructions and examples in how to establish a business driven security architecture.
N**E
Good Conceptual Security Modeling Book
The Enterprise Security Architecture book plays heavily on the SABSA business model created by one of the Authors. It appears to be a good high-level large business model, and my company has adopted it.The problem with the approach is that it is very conceptual, and not well defined for actual business practices. I doubt any company has ever actually implemented the SABSA model in their practices yet.If your willing to charge ahead and define your own processes, this could be a great framework for you. The first third of the book was slow and hard for me to read, but the last two thirds were very logical for my understanding.Whether or not you decide to use the SABSA model, but book is great reference for a high level enterprise architect or security specialist to suggest better strategies for securing your enterprise.
R**G
Great
Just what I expected. Great information
M**M
Contains some gems, but much room to improve
This book truly has some gems of information that I believe will help me become a better security architect; however, getting to those gems was often quite painful, and I had to dig through quite a bit of "fluff" to get to the valuable information. My biggest complaint is that there are no effective and/or practical real world examples of the concepts the author is conveying. Having a few different real world examples of the completed SABSA layering would be invaluable for this rather esoteric information to "click" for the reader. I will admit there is a lengthy case study of a fictional enterprise at the beginning of the book which I do acknowledge and appreciate, but it was barely used throughout the book and no real connection was made to the case study from a SABSA perspective. Further, I had to jump all around the book haphazardly as the author referenced past diagrams and descriptions. If this is the way the author would like to go I'd recommend at least including a page number for where the past information is referenced. Also, I had to do a bunch of supplemental research online and through other resources to gain an acceptable understanding of the concepts and deliverables the author describes. For a 500+ page book, I didn't feel like I should have had to do that. As others have mentioned, the valuable & actionable content of the book (What SABSA is & how to use it with REAL WORLD EXAMPLES) could be presented in a much more concise (yet thorough) format. Nevertheless, I appreciate the authors' efforts to educate on SABSA and I sincerely present this feedback in good faith in hope for others to have a bit easier time with this than I had.
Y**A
Five Stars
Good 👌👍
A**R
Five Stars
Great buy
Trustpilot
2 weeks ago
2 months ago