The Security Policy Cookbook: A Guide for IT and Security Professionals

The Security Policy Cookbook: A Guide for IT and Security Professionals

By: Ali Jahangiri
Publisher: Dr. Ali Jahangiri 
Publication Date: April 2010
ISBN: 978-0984271528
Reviewed by: Michael Feld
Review Date: June 2010

The Security Policy Cookbook is the second computer/network book by author Ali Jahangiri that I have reviewed. Like his first book, Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts, The Security Policy Cookbook is both well written and very applicable to companies needing solid security policies.

Having designed, installed, and repaired many networks in the past, I can state that Dr. Jahangiri’s book addresses many of the issues I have encountered. The Security Policy Cookbook is essentially a collection of security policy templates that the user can customize for his own specific needs. The clarity, structure, and focus of each template conform to best practice policies as defined by many leading manufacturers of computer and/or network security products.

There are 32 topics covered within the pages of this data and IT security book. These include, but are not limited to: Administrative and Special Access Policy, Antivirus Policy, Back Up and Disaster Recovery Policy, Email Policy, Information Security Policy, Internet Use Policy, Intrusion Detection Policy, Password Policy, Privacy Policy, Security Monitoring Policy, Server Hardening Policy, Staff-Owned Computing Equipment Policy, Vendor Access Policy and Wireless Access Point Policy. As one can see, the book covers a broad range of topics needed within the business world. As a bonus, the author has provided a website where these templates are available in an editable format to aid IT personnel in using the book.

The Security Policy Cookbook is not a traditional, readable work. Rather, it should be viewed as a corporate resource for individuals within an organization who are tasked with network and data security. Smaller organizations typically do not have dedicated HR and data security personnel.

Quill says: The Security Policy Cookbook will be an invaluable addition to the “corporate library” of many firms.

For more information on The Security Policy Cookbook, please visit the author's website at: alijahangiri.org

Feathered Quill

Disclosure in Accordance with FTC Guidelines 16 CFR Part 255

Copyrights © 2019 Feathered Quill Reviews All Rights Reserved. | Designed & Developed by 8 Create