PREFACE

When a new software version is released, an updated ‘changelog’ file outlining all changes since the previous version is supplied. It has been five years since the first edition of this book was published: a remarkably long period for the modern information technology milieu, but perhaps not so for its information security shadow or counterpart. This preface is, effectively, a brief changelog for both the book and the environment it applies to in practice.

Strategy-wise, all of the key principles outlined in the first edition stay in place unchallenged. We did not have to change a single epigraph to any section, and remove or replace any quotations forming the book’s logical backbone. The schematics that reflect high-level process structures ...

Get Assessing Information Security: Strategies, tactics, logic and framework now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.