Effective Cybersecurity

A Guide to Using Best Practices and Standards

Nonfiction, Computers, Networking & Communications
Cover of the book Effective Cybersecurity by William Stallings, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: William Stallings ISBN: 9780134772950
Publisher: Pearson Education Publication: July 20, 2018
Imprint: Addison-Wesley Professional Language: English
Author: William Stallings
ISBN: 9780134772950
Publisher: Pearson Education
Publication: July 20, 2018
Imprint: Addison-Wesley Professional
Language: English

The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments

In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the “how” of implementation, integrated into a unified framework and realistic plan of action.

Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material: clear learning objectives, keyword lists, review questions, and QR codes linking to relevant standards documents and web resources.

Effective Cybersecurity aligns with the comprehensive Information Security Forum document “The Standard of Good Practice for Information Security,” extending ISF’s work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature.

• Understand the cybersecurity discipline and the role of standards and best practices
• Define security governance, assess risks, and manage strategy and tactics
• Safeguard information and privacy, and ensure GDPR compliance
• Harden systems across the system development life cycle (SDLC)
• Protect servers, virtualized systems, and storage
• Secure networks and electronic communications, from email to VoIP
• Apply the most appropriate methods for user authentication
• Mitigate security risks in supply chains and cloud environments

This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments

In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the “how” of implementation, integrated into a unified framework and realistic plan of action.

Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material: clear learning objectives, keyword lists, review questions, and QR codes linking to relevant standards documents and web resources.

Effective Cybersecurity aligns with the comprehensive Information Security Forum document “The Standard of Good Practice for Information Security,” extending ISF’s work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature.

• Understand the cybersecurity discipline and the role of standards and best practices
• Define security governance, assess risks, and manage strategy and tactics
• Safeguard information and privacy, and ensure GDPR compliance
• Harden systems across the system development life cycle (SDLC)
• Protect servers, virtualized systems, and storage
• Secure networks and electronic communications, from email to VoIP
• Apply the most appropriate methods for user authentication
• Mitigate security risks in supply chains and cloud environments

This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable.

More books from Pearson Education

Cover of the book Ruthless Execution by William Stallings
Cover of the book T-SQL Fundamentals by William Stallings
Cover of the book Economic Indicators That Matter to Investors by William Stallings
Cover of the book Microsoft Excel 2010 Data Analysis and Business Modeling by William Stallings
Cover of the book Writing a Business Report That Gets Read, Not Filed by William Stallings
Cover of the book Applaud Employee Effort, But Reward Real Contribution by William Stallings
Cover of the book Building iOS 5 Games by William Stallings
Cover of the book Exam Ref 70-480 Programming in HTML5 with JavaScript and CSS3 (MCSD) by William Stallings
Cover of the book Macromedia Dreamweaver 8 for Windows and Macintosh by William Stallings
Cover of the book Business Strategies for the Bottom of the Pyramid (Collection) by William Stallings
Cover of the book System Center Operations Manager (OpsMgr) 2007 R2 Unleashed by William Stallings
Cover of the book Strategies for Success in Retail (Collection) by William Stallings
Cover of the book Brilliant Strategy for Business by William Stallings
Cover of the book Microsoft XNA Game Studio 3.0 Unleashed by William Stallings
Cover of the book Brilliant Life Coach 2e by William Stallings
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy