Kevin Flanagan wrote:

        I am now a part of the Information Security team at work, we are just
starting the process of creating a formal "Program for vulnerability
assessments", by program we mean process, documentation, and tools.

I recommend the book "Principles of Information Security" by Michaael E. Whitman and Herbert J. Mattord. There is a lot of great information
in there regarding the process and management aspects of security.  Not
a lot of technical information, but some good stuff on risk assessment
and security process stuff. Some of the material is a little dry, and most hard-core techies will find it chuffing boring, but the material
is valuable, IMO.

HTH, YMMV, etc...


TTYL,


Phil
--
North Carolina - First In Freedom

Free America - Vote Libertarian
www.lp.org

--
TriLUG mailing list        : http://www.trilug.org/mailman/listinfo/trilug
TriLUG Organizational FAQ  : http://trilug.org/faq/
TriLUG Member Services FAQ : http://members.trilug.org/services_faq/
TriLUG PGP Keyring         : http://trilug.org/~chrish/trilug.asc

Reply via email to