This book makes the assumption that if we've been doing the same thing for years and we continue to fail then we must be doing something wrong. Some basic assumption about what we're doing and why we're doing it is incorrect. Yes, incorrect. But we continue to behave as if nothing is wrong. The pain is there but now the problem is that it's so ubiquitous that we've become desensitized to it. Like the buzzing the florescent lights make (yes, they do make an annoying sound) or the violence on TV, we've just gotten so used to having it around we've come up with coping mechanisms to deal with it. Why hasn't anyone asked why the pain is there in the first place?
This book does.
This book is different because it uses a basic tenant of science to understand what the problem is and how to manage it. This book uses a process control model to explain why securing the endpoint is the smartest thing you can do to manage the problem of network contamination and infestation. We'll explain the differences between endpoints and how to secure them at various levels. We start with the basic tools and settings that come with each endpoint, move to those required tools such as antivirus, and progress to endpoints that have been upgraded with additional security protocols and tools, such as 802.1x and the supplicant, that enable a closed loop process control model that enforces a minimum level of security.
If you're a security manager, security administrator, desktop support person, or someone that will be or is managing, responding or responsible for the security issues of the network, this book is for you. If your job depends on ensuring that the network is not just 'up' but functional as a tool for generating, sharing, and storing information, you'll want to read this book. If you've ever been fired because some script kiddie managed to gain access to the CEO's laptop, you'll want this book on your shelves. If you're worried about Barney in the cube next to yours downloading the latest 'free' video clip or the latest cool chat client, you want to buy this book and give it to your desktop administrator.