Book Reviews: Auditing Cloud Computing

Book Reviews: Auditing Cloud Computing

Ben Halpert | Reviewed by Larry Marks, CISA, CISM, CGEIT, CRISC, CFE, CISSP, CSTE, ITIL, PMP Auditing Cloud Computing offers an independent supplement to Security Considerations for Cloud Computing, part of ISACA’s Cloud Computing Vision Series, which provides guidance to the auditor on how to help IT and business professionals who are considering the possibility [...]

Book Reviews: Computer Security Handbook, 6th Edition

Book Reviews: Computer Security Handbook, 6th Edition

Seymour Bosworth, Michel E. Kabay and Eric Whyne | Reviewed by Dino Ippoliti, CISA, CISM Many students and young professionals want to know which topics they should master in the information security field. The answer is contained in the two volumes of theComputer Security Handbook, which has 75 chapters, written by industry professionals. The sixth [...]

Best Practices for Defending Against APTs

Best Practices for Defending Against APTs

Advanced persistent threats (APTs) have changed the world of enterprise security and how networks and organizations are attacked. In a new Palo Alto Networks eBook, Cybersecurity for Dummies, we explore: The cybersecurity landscape and why traditional security solutions fail What next-generation security brings to the fight Ten best practices for controlling APTs Head to our Cybersecurity for [...]

VMware vSphere Design, 2nd Edition

VMware vSphere Design, 2nd Edition

Forbes Guthrie, Scott Lowe ISBN: 978-1-118-40791-2 Paperback 528 pages March 2013 Achieve the performance, scalability, and ROI your business needs What can you do at the start of a virtualization deployment to make things run more smoothly? If you plan, deploy, maintain, and optimize vSphere solutions in your company, this unique book provides keen insight and [...]