Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
For technical readers, this is probably not what they look for. The book provides high-level perspective on defending in cyber security. I liked certain structural ideas, real-world examples, and the title (could be rather Adaptive istead of Advanced). I didn't like too much abstraction and generality, typos and often complicated phrasing.
It was refreshing to read that security is not attainable; that it is a journey, not a destination. At the end, the author rightly calls out what the name of the book should be, “adaptive persistent security,” for it is only in being adaptive to the ever changing methods of attack that a true, persistent, security professional is going to be able to provide the defense necessary for their organization.