Jump to content











Photo
* * * * * 9 votes

Security Policy Cookbook, Recipes for Security Policy Makers


  • Please log in to reply
3 replies to this topic

#1 Jamal H. Naji

Jamal H. Naji

    Frequent Member

  • Tutorial Writer
  • 178 posts
  •  
    United States

Posted 15 July 2010 - 11:49 PM

A fantastic new book I had the chance recently to evaluate, it's by Dr. Ali Jahangiri, the new book is a unique guide for IT and security professionals to streamline their security policy formulation.
Based on years of information security expertise, this cookbook provides all the ingredients needed to create easy-to-understand security policies covering areas like passwords, intruder detection and wireless networks.
Dr. Ali Jahangiri , a world-renowned computer and security expert, in launching of his new book (The Security Policy Cookbook) is Providing "recipes" for security policies in all areas, from password and Internet use policies to intruder user detection and public mailing list policies.
The Security Policy Cookbook is a unique guide for IT and security professionals to streamline security policy formulation.
With over 14 years of experience as a security auditor, security consultant and trainer, Dr. Ali Jahangiri brings the full force of his knowledge and expertise to bear in this exceptional book. When devising security related company policies, expertise is essential, and this book releases Dr. Jahangiri's expertise for IT professionals to tap into when developing security related rules, guidelines and recommendations.
As an experienced lecturer and trainer, Dr. Jahangiri was often asked by course participants for a copy of his own personal arsenal of security policy templates. To meet this need Dr. Jahangiri painstaking researched and compiled a complete collection of security policies and published them as this cookbook.
"I decided to address the need, "says Dr. Jahangiri", spending more than two years to study and bring together the contents of this book in order to create a comprehensive collection of security policy templates."
Dr Jahangiri's informative guide covers a wide range of security policy areas including Antivirus Policy, Back Up and Disaster Recovery Policy, Computer Account Management, Email, Internet Access and Use Policy, Password, Portable Computing Devices, Server Hardening, System Development and Wireless Network policies.
One of the unique aspects of this book is that a one time payment of $149.90, gives security policy makers access to Dr. Jahangiri's templates in a fully editable form. This means that they can be used as the starting points for the actual security policies deployed by any company with much of the hard work, research and repetition removed. The templates can be purchased from securitypolicycookbook.com.
The 160 page book is available directly from the securitypolicycookbook.com website or from Amazon.com.
Useful Tutorial:
===========
1- Live Hacking Cd of Dr. Ali Jahangiri on a USB thumb drive, How to make Tutorial Guide
2- All in 1 Mission Impossible USB thumb drive,How to make Tutorial Guide
3- Clone your system to a USB portable HDD and work with it virtually from any PC.
=============================================================

My Other Topics & Tutorials HERE

#2 Wonko the Sane

Wonko the Sane

    The Finder

  • Advanced user
  • 16066 posts
  • Location:The Outside of the Asylum (gate is closed)
  •  
    Italy

Posted 16 July 2010 - 11:54 AM

Better than WAREZ, but still a good ol' plain ADVERTISEMENT.

:cheers:

BTW, coming from an Author, the disclaimer on the site's terms of use is interesting:

2. User Submissions. Any messages, suggestions, ideas, or concepts that are submitted through the Site shall become, and remain, the property of Dr.Ali Jahangiri. You agree that any submissions, in whole or in part, may be used by Dr.Ali Jahangiri or any of its affiliates for any purpose including modification, reproduction, transmission, publication, broadcast, and posting. You additionally agree that Dr.Ali Jahangiri is free to use any ideas, concepts, techniques, or know-how contained in any communication you send to the Site for any purpose whatsoever including, but not limited to, developing, manufacturing, marketing, and selling products and services based upon such information without any obligation to compensate you or anyone else for them. By making such submissions, you are assigning and transferring any and all right, title and interest in those submissions to Dr.Ali Jahangiri, including any moral rights. You represent and warrant by submitting any materials that such submission does not infringe any third-party intellectual property rights. Do not transmit any unlawful, threatening, libelous, defamatory, obscene, pornographic, or profane material, or any other material that could constitute or encourage conduct that could be considered a criminal offense or violate any law. Further, you agree not to use any facilities or resources available on or through Dr.Ali Jahangiri to perpetrate prohibited conduct, whether against Dr.Ali Jahangiri or his companies, or any other third party. Examples of prohibited conduct include, but are not limited to chain letters, pornography, or other communication that creates a nuisance or is otherwise offensive to the recipient.


It could be summed up as:

ALL YOUR BASE ARE BELONG TO US!


Posted Image

:thumbup:

Wonko

#3 Wonko the Sane

Wonko the Sane

    The Finder

  • Advanced user
  • 16066 posts
  • Location:The Outside of the Asylum (gate is closed)
  •  
    Italy

Posted 15 January 2011 - 07:18 PM

Just to keep this thing alive, Dr. Ali Jahangiri has made it to the attrition.org Charlatan list :):
http://attrition.org/errata/charlatan/
http://attrition.org.../ali_jahangiri/

mainly for his suspected (actually proved) plagiarist approach.

:cheers:
Wonko

#4 sambul61

sambul61

    Gold Member

  • Advanced user
  • 1568 posts
  •  
    American Samoa

Posted 15 January 2011 - 08:09 PM

Trying to be somewhat neutral, the attrition.org does not provide any evidence either or even examples of a person's wrong doing apart from wholesale "bad guy" claims.




1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users