Effective Cybersecurity

Effective Cybersecurity
Author :
Publisher : Addison-Wesley Professional
Total Pages : 1081
Release :
ISBN-13 : 9780134772950
ISBN-10 : 0134772954
Rating : 4/5 (54 Downloads)

Book Synopsis Effective Cybersecurity by : William Stallings

Download or read book Effective Cybersecurity written by William Stallings and published by Addison-Wesley Professional. This book was released on 2018-07-20 with total page 1081 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the “how” of implementation, integrated into a unified framework and realistic plan of action. Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material: clear learning objectives, keyword lists, review questions, and QR codes linking to relevant standards documents and web resources. Effective Cybersecurity aligns with the comprehensive Information Security Forum document “The Standard of Good Practice for Information Security,” extending ISF’s work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature. • Understand the cybersecurity discipline and the role of standards and best practices • Define security governance, assess risks, and manage strategy and tactics • Safeguard information and privacy, and ensure GDPR compliance • Harden systems across the system development life cycle (SDLC) • Protect servers, virtualized systems, and storage • Secure networks and electronic communications, from email to VoIP • Apply the most appropriate methods for user authentication • Mitigate security risks in supply chains and cloud environments This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable.


Effective Cybersecurity Related Books

Effective Cybersecurity
Language: en
Pages: 1081
Authors: William Stallings
Categories: Computers
Type: BOOK - Published: 2018-07-20 - Publisher: Addison-Wesley Professional

DOWNLOAD EBOOK

The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings int
Best Practices in Computer Network Defense: Incident Detection and Response
Language: en
Pages: 160
Authors: M. Hathaway
Categories: Computers
Type: BOOK - Published: 2014-01-21 - Publisher: IOS Press

DOWNLOAD EBOOK

The cyber security of vital infrastructure and services has become a major concern for countries worldwide. The members of NATO are no exception, and they share
Computers at Risk
Language: en
Pages: 320
Authors: National Research Council
Categories: Computers
Type: BOOK - Published: 1990-02-01 - Publisher: National Academies Press

DOWNLOAD EBOOK

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided
Effective Model-Based Systems Engineering
Language: en
Pages: 788
Authors: John M. Borky
Categories: Technology & Engineering
Type: BOOK - Published: 2018-09-08 - Publisher: Springer

DOWNLOAD EBOOK

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise p
Defensive Security Handbook
Language: en
Pages: 278
Authors: Lee Brotherston
Categories: Computers
Type: BOOK - Published: 2017-04-03 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outso