Goodreads helps you keep track of books you want to read.
Start by marking “Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps” as Want to Read:
Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps
Enlarge cover
Rate this book
Clear rating
Open Preview

Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps

4.13  ·  Rating details ·  70 ratings  ·  4 reviews
Visible Ops Security builds upon the methodology presented in the original Visible Ops Handbook. It guides information security professionals in strengthening relationships with IT operations and development groups to advance IT objectives and business goals. It addresses the people side of IT, empowering security to work with operations teams to achieve closely aligned ob ...more
Paperback, 108 pages
Published December 31st 2008 by IT Process Institute (first published March 12th 2008)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Visible Ops Security, please sign up.

Be the first to ask a question about Visible Ops Security

Community Reviews

Showing 1-30
4.13  · 
Rating details
 ·  70 ratings  ·  4 reviews


Filter
 | 
Sort order
Eric Kolb
Jun 04, 2014 rated it really liked it
Shelves: business, non-fiction
Dry as a bone, but a good signpost for thinking about where you should go from here in the field of information security. Phase 2 gets a bit abstract, dealing with risk in a more nebulous way than I think most folks would prefer. Nevertheless, there's a lot of good practical advice in here; this is definitely something I'll share with some of my team members who are really driven to help mature the IT and security organization.
Jeff
Feb 18, 2013 rated it liked it
I thought that this was an okay read, but about 60% of the content was a rote rehash of the much more generally applicable The Visible Ops Handbook. With this book smaller than a lot of coffee table books, that doesn't leave a whole lot of content for the money. Worth borrowing, not worth buying.
Shaun Mouton
May 04, 2013 rated it really liked it
Like the other Visible Ops books, its strength lies in the distillation of complex information to a set of essentials well suited to a management audience. These books can be used to guide processes towards functional implementations of ITIL and a healthier service orientation.
Jeremy
Jun 12, 2008 rated it really liked it
Not a pleasure read, but a good read for IT or Information Security professionals.
Scott Anderson
rated it really liked it
Sep 28, 2015
Simonas Būda
rated it really liked it
Dec 18, 2018
Dick McNeil
rated it it was ok
Jun 12, 2008
Pyang
rated it really liked it
Jan 18, 2016
Sean Lamm
rated it it was amazing
Dec 28, 2015
John Hoffoss
rated it it was amazing
Dec 10, 2016
Simon
rated it really liked it
Jul 14, 2017
Brook Ferguson
rated it it was amazing
May 30, 2015
Paul Horbal
rated it it was amazing
Nov 19, 2015
Ariel Companioni
rated it really liked it
Nov 19, 2015
jaybee_reads
rated it really liked it
Nov 19, 2015
Rick Patterson
rated it liked it
Jul 13, 2015
Thomas R. Sinnott
rated it it was amazing
Dec 27, 2014
Nigel Harris
rated it liked it
Sep 30, 2013
Paul Vilevac
rated it it was amazing
Oct 01, 2015
Shannon
rated it it was amazing
Mar 25, 2016
Matt
rated it liked it
Apr 04, 2011
Kris Arthur
rated it it was amazing
Jan 11, 2015
Paul Turcotte
rated it it was amazing
Nov 22, 2018
Mark Potter
rated it it was amazing
Nov 27, 2015
Kim Halavakoski
rated it really liked it
Feb 18, 2015
Chris
rated it liked it
Oct 20, 2014
Tomas Dabasinskas
rated it liked it
Mar 24, 2015
Daryl Irby
rated it it was amazing
Aug 21, 2016
Ladislav Prskavec
rated it really liked it
Nov 16, 2016
kemal
rated it really liked it
Jan 01, 2009
« previous 1 3 next »
There are no discussion topics on this book yet. Be the first to start one »
  • The Visible Ops Handbook: Starting ITIL in 4 Practical Steps
  • Web Operations: Keeping the Data on Time
  • Beyond the Goal: Eliyahu Goldratt Speaks on the Theory of Constraints
  • Scalable Internet Architectures
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • Practical UNIX & Internet Security
  • Drift Into Failure: From Hunting Broken Components to Understanding Complex Systems
  • The Best of 2600: A Hacker Odyssey
  • File System Forensic Analysis
  • The Practice of System and Network Administration
  • (DROP THE PINK ELEPHANT: 15 WAYS TO SAY WHAT YOU MEAN - AND MEAN WHAT YOU SAY) BY Paperback
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Release It!: Design and Deploy Production-Ready Software (Pragmatic Programmers)
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • Windows® Internals (PRO-Developer)
  • Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation
  • Stealing the Network: How to Own an Identity
  • Hacking: The Next Generation

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »
227 followers
Gene Kim is a multiple award-winning CTO, Tripwire founder, Visible Ops co-author, IT Ops/Security Researcher, Theory of Constraints Jonah, a certified IS auditor and a rabid UX fan.

He is passionate about IT operations, security and compliance, and how IT organizations successfully transform from "good to great."