Get Free Shipping on orders over $79
Effective Cybersecurity : A Guide to Using Best Practices and Standards - William Stallings

Effective Cybersecurity

A Guide to Using Best Practices and Standards

By: William Stallings

Paperback | 31 August 2018 | Edition Number 1

At a Glance

Paperback


$92.95

or 4 interest-free payments of $23.24 with

 or 

Ships in 5 to 7 business days

William Stallings' Effective Cybersecurity offers a comprehensive and unified explanation of the best practices and standards that represent proven, consensus techniques for implementing cybersecurity. Stallings draws on the immense work that has been collected in multiple key security documents, making this knowledge far more accessible than it has ever been before. Effective Cybersecurity is organized to align with the comprehensive Information Security Forum document The Standard of Good Practice for Information Security, but deepens, extends, and complements ISF's work with extensive insights from the ISO 27002 Code of Practice for Information Security Controls, the NIST Framework for Improving Critical Infrastructure Cybersecurity, COBIT 5 for Information Security, and a wide spectrum of standards and guidelines documents from ISO, ITU-T, NIST, Internet RFCs, other official sources, and the professional, academic, and industry literature.

 

In a single expert source, current and aspiring cybersecurity practitioners will find comprehensive and usable practices for successfully implementing cybersecurity within any organization. Stallings covers:

  • Security Planning: Developing approaches for managing and controlling the cybersecurity function; defining the requirements specific to a given IT environment; and developing policies and procedures for managing the security function
  • Security Management: Implementing the controls to satisfy the defined security requirements
  • Security Evaluation: Assuring that the security management function enables business continuity; monitoring, assessing, and improving the suite of cybersecurity controls.

Beyond requiring a basic understanding of cryptographic terminology and applications, this book is self-contained: all technology areas are explained without requiring other reference material. Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings, author of 13 TAA Computer Science Textbooks of the Year, offers many pedagogical features designed to help readers master the material. These include: clear learning objectives, keyword lists, and glossaries to QR codes linking to relevant standards documents and web resources.

More in Computing & Programming Higher Education Textbooks

The C Programming Language : Prentice Hall Software - Brian Kernighan

RRP $107.04

$77.75

27%
OFF
Artificial Intelligence : A Modern Approach, 4th Global Edition - Stuart Russell
Site Reliability Engineering : How Google Runs Production Systems - Betsy Beyer
Theory of Fun for Game Design - Raph Koster

RRP $85.75

$43.75

49%
OFF
Computer Systems 3ed : A Programmer's Perspective, Global Edition - David O'Hallaron
Computer Networking, Global Edition : 8th edition - James Kurose

RRP $186.38

$138.75

26%
OFF
Information Architecture : For the Web and Beyond : 4th Edition - Jorge Arango
Design Patterns : Elements of Reusable Object-Oriented Software - Erich Gamma
Python Cookbook : Recipes for Mastering Python : 3rd Edition - David Beazley
Git : Pocket Guide : A Working Introduction - Richard Silverman

RRP $47.75

$26.75

44%
OFF
Microsoft Power BI Dashboards Step by Step : Step by Step - Errin O'Connor
UNIX and Linux System Administration Handbook : 5th Edition - Ben Whaley
C++ How to Program, Global Edition : 10th Edition - Paul Deitel

RRP $167.95

$133.75

20%
OFF
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Building a Scalable Data Warehouse with Data Vault 2.0 - Dan Linstedt
Systems Analysis and Design : 12th edition - Harry J. Rosenblatt

RRP $169.95

$137.99

19%
OFF