
Book Introduction: Information Technology Security Guide
The book “Information Technology Security Guide”, written by George Sadowsky, James X. Dempsey, Alan Greenberg, Barbara J. McKeon, and Allen Schwartz, has been translated into Persian by Mehdi Mirdamadi, Zahra Shojai, and Mohammad Javad Samadi. George Sadowsky, who is considered the main author of this book, has worked as a mathematician and programmer at the forefront of computing centers at the Brookings Institution, Northwestern University, and New York University. He has also been a supporter of the United Nations technical assistance project and has worked in over 50 developing countries.
The mentioned book consists of five sections: “Information Technology Security in the Digital Age”, “Information Technology Security and Individual Users”, “Information Technology Security and Organizations”, “Information Technology Security and Government Policies”, and “Information Technology Security and Technical Leaders”. Each of these sections can be studied independently from the others.
The introduction of the Information Technology Security Guide (covering the concept of information technology security, including the two subjects of computer security and cyber security) states: “Information and communication technology, like other technologies, has a tool-like nature and can be used in a way that is beneficial to everyone or in a way that can bring dangerous consequences. The speed factor in information and communication technology is in the range of microseconds, which makes it possible for information to be controlled by software created by individuals and moved in a way that is not visible to the naked eye. In such an environment, illegal and destructive actions can occur so quickly that they may be unidentifiable, although not impossible to identify… It is the responsibility of every individual to maintain security. This individual can be a regular user, a technical expert, a system administrator, a network administrator, or a manager of a system or network in an organization. Paying attention to the importance of security leads to necessary actions and reassurance for protecting systems,
This book, written with an emphasis on its authors, is a practical guide for readers in developing countries to understand and implement steps to achieve security in information technology applications. In addition to providing a summary of physical and electronic threats in the field of information technology security, the aforementioned book discusses management solutions, regulated environments, and collaborative patterns of organizations that exist in markets, governments, professional institutions, and international organizations. It also covers a variety of topics that cover other dimensions of information technology security, and therefore learning its contents is a step towards transferring information and capacity building at the local level in today’s expanding world.
Book Title: Guide to Information Technology Security
Authors: Sadusky, James X. Dempsey, Allen Greenberg, Barbara J. Mc and Allen Schwartz
Translators: Mehdi Mirdamadi, Zahra Shojai, and Mohammad Javad Samadi
Publisher: Secretariat of the Supreme Council of Information
Tags
Information Technology Security Guide Introduction to the book James Excel Magazine number 45 The Secretariat of the Supreme Council of Information Dissemination