Enterprise Security Architecture: A Business-Driven Approach
Thumbnail 1

Enterprise Security Architecture: A Business-Driven Approach

4.4/5
Product ID: 1926759
Secure Transaction

Description

Enterprise Security Architecture: A Business-Driven Approach

Reviews

4.4

All from verified purchases

J**.

Loved it. Both the totality of the deliverables and ...

Loved it. Both the totality of the deliverables and process but the best part is that these Brits can write exceptionally well. Less than ten grammatical errors in a 600 page book. And that may be from my US English POV. This book is for the Don Quixote who needs to collect and organize the security pieces, catalog them, refine them and take on a windmill. I hope you like going big because that's why you better have Bill Clinton's charisma, your going to need it. Hercules cleaned the stables. Good Luck!!

A**R

Pleasant and helpful reading

The book is very pleasant reading both for those who are native in the information security landscape and for those of us who have worked in the security field for a long time. The book gives good instructions and examples in how to establish a business driven security architecture.

R**G

Great

Just what I expected. Great information

T**Y

Sorry

First off, I have read this book cover to cover. I have been practicing information security architecture and implementation for 10 years. I really liked the in-depth coverage of information security in general. The mapping of the Zachman Framework cells to the so-called SABSA framework is also impressive, but is simple enough to not warrant a whole chapter to be honest. But what is evident to me might not be so to the novice so I take nothing away from the author here.However, I am very disappointed with this book from an application of methods standpoint. I was expecting so much more.At the very least I expected some 'real-world' scenarios to be covered in some detail so the practitioner can use material, techniques presented in the book on the job. In several places, this book comes close to revealing the application of methodology being propounded under the trade name of SABSA but then fails to do so. Time and again, I turned over to the next page in anticipation but was left disappointed and exasperated! The author simply refers the reader to contact him for further details- well that's the point of reading the book isn't it? I bought this book for the details but left with an imitation of the Zachman Framework, which by the way is still more directly applicable to information security than SABSA in my most humble opinion. If I am wrong in having said that, it is because I did not learn how or why based on my reading of this book.I still give it 4 because I like to round up from 3.5- there is too much good information here for the novice for me to rate it 3.

Y**A

Five Stars

Good 👌👍

M**M

Contains some gems, but much room to improve

This book truly has some gems of information that I believe will help me become a better security architect; however, getting to those gems was often quite painful, and I had to dig through quite a bit of "fluff" to get to the valuable information. My biggest complaint is that there are no effective and/or practical real world examples of the concepts the author is conveying. Having a few different real world examples of the completed SABSA layering would be invaluable for this rather esoteric information to "click" for the reader. I will admit there is a lengthy case study of a fictional enterprise at the beginning of the book which I do acknowledge and appreciate, but it was barely used throughout the book and no real connection was made to the case study from a SABSA perspective. Further, I had to jump all around the book haphazardly as the author referenced past diagrams and descriptions. If this is the way the author would like to go I'd recommend at least including a page number for where the past information is referenced. Also, I had to do a bunch of supplemental research online and through other resources to gain an acceptable understanding of the concepts and deliverables the author describes. For a 500+ page book, I didn't feel like I should have had to do that. As others have mentioned, the valuable & actionable content of the book (What SABSA is & how to use it with REAL WORLD EXAMPLES) could be presented in a much more concise (yet thorough) format. Nevertheless, I appreciate the authors' efforts to educate on SABSA and I sincerely present this feedback in good faith in hope for others to have a bit easier time with this than I had.

A**R

Five Stars

Great buy

R**R

Five Stars

helped with class

Common Questions

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Abdullah B.

Great price for an authentic product. Fast international shipping too!

3 weeks ago

Sneha T.

Received my product in pristine condition. Great service overall.

1 month ago

Shop Global, Save with Desertcart
Value for Money
Competitive prices on a vast range of products
Shop Globally
Serving millions of shoppers across more than 100 countries
Enhanced Protection
Trusted payment options loved by worldwide shoppers
Customer Assurance
Trusted payment options loved by worldwide shoppers.
Desertcart App
Shop on the go, anytime, anywhere.
₩232678

Duties & taxes incl.

South Koreastore
1
Free Shipping

with PRO Membership

Free Returns

30 daysfor PRO membership users

15 dayswithout membership

Secure Transaction

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Sneha T.

Received my product in pristine condition. Great service overall.

1 month ago

Vikram D.

The MOLLE sheath is of exceptional quality. Very happy with my purchase.

2 weeks ago

Enterprise Security Architecture A Business Driven Approach | Desertcart South Korea