£63.99
FREE Delivery in the UK.
Only 2 left in stock (more on the way).
Dispatched from and sold by Amazon.
Gift-wrap available.
Quantity:1
Enterprise Security Archi... has been added to your Basket
Trade in your item
Get a £19.25
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Enterprise Security Architecture: A Business-Driven Approach Hardcover – 15 Nov 2005

5 customer reviews

See all 3 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
Hardcover
"Please retry"
£63.99
£49.89 £56.04
£63.99 FREE Delivery in the UK. Only 2 left in stock (more on the way). Dispatched from and sold by Amazon. Gift-wrap available.

Frequently Bought Together

Enterprise Security Architecture: A Business-Driven Approach + Open Enterprise Security Architecture (O-ESA): A Framework and Template for Policy-Driven Security (The Open Group Series)
Price For Both: £96.98

Buy the selected items together

Trade In this Item for up to £19.25
Trade in Enterprise Security Architecture: A Business-Driven Approach for an Amazon Gift Card of up to £19.25, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Product details

  • Hardcover: 608 pages
  • Publisher: CRC Press; 1 edition (15 Nov. 2005)
  • Language: English
  • ISBN-10: 157820318X
  • ISBN-13: 978-1578203185
  • Product Dimensions: 4.4 x 21 x 26 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (5 customer reviews)
  • Amazon Bestsellers Rank: 180,686 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, and more.

Product Description

About the Author

John Sherwood, active in operational risk management for more than a decade and as an information systems professional for more than 30 years, is the Chief Architect of the SABSA(r) model. He is also a visiting lecturer and external examiner at Ro

Inside This Book

(Learn More)
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

5.0 out of 5 stars
5 star
5
4 star
0
3 star
0
2 star
0
1 star
0
See all 5 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

16 of 17 people found the following review helpful By "jonasbelbin" on 25 Nov. 2005
Format: Hardcover
I first saw a colleague's preview copy of this book in September and have just got a copy of the real thing. First things first, this book describes exactly what it says on the cover i.e. a Business Driven Approach to security. If you are used to technical security architectures being the start point for security implementations then think again. This book says you should start your work by talking with the "top of the shop" at any enterprise and make sure that your ESA is aligned with the real business drivers of the business. Although this sounds like common sense, in my opinion too many of us have got bogged down in the technologies of authentication, encryption etc. over the years and failed to recognise the real needs of the businesses in which we work.
I particularly liked two things about this book:
- the layout in two distinct parts, ths first covering the philosophy and approach of SABSA, followed by more of a reference type second section;
- the "quick notes" in the left hand column of every page that let's you speed read each chapter.
I think that this book will challenge a lot of conventional approaches - for example where else do you see a section on Measuring Return on Investment in Security?
This book will not be a favourite of everyone that reads it - I did like it and am using it already in my work.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 9 people found the following review helpful By N. J. Bjergstrom on 9 Dec. 2008
Format: Hardcover
The SABSA method has been under development and in practical use for ten-fifteen years, mostly based on progressive conference presentations by the authors. The impression brought home from listening to the presentations was that this was something really great, breaking new ground and vastly more comprehensive than other enterprise security methods developed by the large consulting companies and a range of mostly American authors. If only it were possible to find all of it documented in one single place so that it could be understood holistically.

This book does exactly that, and it does not disappoint. It is worth the ten-fifteen years wait and without any doubt the best work so far written about corporate security architectures. If government departments and their sub-contractors had followed this development process and implemented it rigorously we would not have seen the past few years' data loss scandals.

The SABSA method should be used as the primary planning tool by all large organisations, not least governments. It makes it possible to introduce top level security without losing usability and flexibility - and without getting into the situation where a single rogue element in an organisation can cause huge havoc. It allows data to be valued correctly so that organisations avoid spending money on unnecessary security measures while providing appropriate information security throughout. The scope of the SABSA method, while primarily intended to provide an information security architecture, actually extends further and will help set up corporate management structures that can be used for other purposes as well.

The book is written by three of the best experts of information security, globally. It should be studied by anybody involved with information security and corporate governance.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Dhiren on 2 Oct. 2013
Format: Hardcover Verified Purchase
I bought this book some three years ago after speaking briefly with on of the authors and a couple of the reviewers/contributors. As an enterprise architect this book provides fantastic knowledge which I can relate to in my day-to-day work. It provides for methods, concepts and relationships at each architectural tier. Anyone wanting to design security into the business should seriously consider buying and reading this book. The authors rightly point out that the architecture must meet business objectives. This should be aligned using Contextual and Conceptual architectures that are underwritten/approved by the business before any investment should be made in the Logical/Physical architecture. If done correctly you will have a good security service for your business - priceless information. There are loads of tips and clues in this excellent book, a must buy for any Information Security Manager, enterprise architect and those techies who want to understand frameworks. Sorry for the late review!!!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 9 people found the following review helpful By Mr. J. Arnold on 1 Jun. 2006
Format: Hardcover Verified Purchase
I cannot praise this book too highly. It covers the whole field of enterprise security architecture in great breadth and detail. Numerous useful models and patterns are included. Valuable (and sometimes amusing) case histories abound.

The writing is particularly clear; difficult topics are explained in full and I gained new insights in many areas.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Hardcover Verified Purchase
Great book, covers everything you need to know about Enterprise Security Architecture,I was going to purchase the Kindle version (its a heavy book) but it isn't available for the Kindle Paperwhite or Windows 8.2 and lacks the ability to change text size on Android...oh well.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again


Feedback