The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

Stopping with this site

I am stopping with this site. If you want to take over the site with domain name get in touch, e-mail address below.

Book details of 'Information Security Policies Made Easy Version 9'

TitleInformation Security Policies Made Easy Version 9
Author(s)Charles Cresson Wood
PublishedSeptember 2002
PublisherBaseline Software
Web links for this book
Search at
Wikipedia booksources

Back to shelf Computer security

Score: score: 3.3 ***--  Vote for this book

The Virtual Bookcase Reviews of 'Information Security Policies Made Easy Version 9':

Reviewer Rob Slade wrote:
Data security texts and talks often promote numerous concepts that should be added to, or included in, security policies. There are numerous presentations in even general computer conferences on designing such policy documents. Few policies, however, actually get written. Those that do are often full of holes and gaps. Writing a security policy is an enormous undertaking, and most companies will not allow for the resources necessary to do it well. This uniquely valuable tool can save a great deal of time in the process. It is a set of over 600 sample paragraphs for a policy document, provided in both hard copy and soft copy, for ease of use. The book starts with an overview of what policies are, as distinct from guidelines, standards, procedures, and controls; the needs for, and uses of, policies; and, strategies for formation of policies. I stress, again, the word "tool." The book could be confused with a single data security policy document, albeit an overly large one. The items should, however, be tailored to your organization and vetted with care. For example, of the nine items related to computer viral programs, six contain flaws such as misleading information (ironically irrelevant to the policy under discussion), over detail (a procedure, rather than a policy), draconian measures (likely to be ignored and, therefore, weaken the whole), or policies which are admirable in themselves, but unworkable with existing technologies. Of the three remaining policies, one would be primarily useful only in a software development shop, while another would be useless in the same environment. This leaves but one policy out of the nine which is acceptable without modification regardless of business type. My choice of viral program policies in this example may be seen as unfair: after all, I am an expert in a fairly esoteric field. However, it does point out the need to thoroughly examine each policy both in terms of general usefulness and the specifics of your particular business and work environment. The book also contains references to publications, groups and standards that will be of assistance in the policy formation process. Although the price is steep, the resources contained herein are undoubtedly worth it and more for any IT shop facing the policy issue. copyright Robert M. Slade, 1994

Add my review for Information Security Policies Made Easy Version 9
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail
Site credits
Copyright © 2000-2022 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement