Table of Contents
  • Home
  • /
  • Learn
  • /
  • Book
  • /
  • Effective Cybersecurity: A Guide to Using Best Practices and Standards 1st Edition

Effective Cybersecurity: A Guide to Using Best Practices and Standards 1st Edition

AuthorWilliam Stallings

Published date: August 2018


September 14, 2024
Cover photo of Effective Cybersecurity: A Guide to Using Best Practices and Standards 1st Edition

Product details

  • Publisher ‏ : ‎ Addison-Wesley Professional; 1st edition (August 31, 2018)

  • Language ‏ : ‎ English

  • Paperback ‏ : ‎ 800 pages

  • ISBN-10 ‏ : ‎ 0134772806

  • ISBN-13 ‏ : ‎ 978-0134772806

  • Item Weight ‏ : ‎ 2.72 pounds

  • Dimensions ‏ : ‎ 7 x 2.05 x 9.1 inches

Book Description

In the rapidly evolving landscape of cybersecurity, it is crucial for professionals to have access to a comprehensive guide that encapsulates the best practices and standards in the field. "Effective Cybersecurity: A Guide to Using Best Practices and Standards" by William Stallings is an indispensable resource that bridges the gap between the vast array of security documents and the practical implementation of cybersecurity measures.

This book offers a unified explanation of proven, consensus techniques for implementing cybersecurity, drawing from key security documents such as The Standard of Good Practice for Information Security by the Information Security Forum, ISO 27002 Code of Practice for Information Security Controls, NIST Framework for Improving Critical Infrastructure Cybersecurity, and COBIT 5 for Information Security.

Key Features

  • Aligns with the comprehensive Information Security Forum document The Standard of Good Practice for Information Security

  • Deepens, extends, and complements ISF's work with insights from various standards and guidelines documents

  • Covers security planning, security management, and security evaluation

  • Provides clear technical overviews and detailed discussions of action items and appropriate policies

  • Includes pedagogical features such as learning objectives, keyword lists, glossaries, and QR codes linking to relevant resources

What You Will Learn?

By reading this book, you will gain:

  • Approaches for managing and controlling the cybersecurity function

  • Knowledge of defining the requirements specific to a given IT environment

  • Strategies for developing policies and procedures for managing the security function

  • Understanding of implementing controls to satisfy defined security requirements

  • Techniques for assuring business continuity through the security management function

  • Methods for monitoring, assessing, and improving the suite of cybersecurity controls

Who this Book is for?

"Effective Cybersecurity" is designed for current and aspiring cybersecurity practitioners who seek to implement successful cybersecurity measures within their organizations. The book requires only a basic understanding of cryptographic terminology and applications, making it accessible to a wide range of readers.

About the Author

Dr. William Stallings is a renowned author who has made significant contributions to the understanding of computer security, computer networking, and computer architecture. He has authored 18 textbooks and a total of 70 books on these subjects. Dr. Stallings has been a technical contributor, technical manager, and an executive with several high-technology firms, and currently works as an independent consultant. He holds a Ph.D. from M.I.T. in Computer Science and a B.S. from Notre Dame in Electrical Engineering.

Disclaimer: This page contains affiliate links. By making a purchase through these links, we may earn a commission at no extra cost to you. Visit Affiliate Program page for more details Thank you!

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Blog

Recently added

View all

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe