Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Effective Cybersecurity - A Guide to Using Best Practices and Standards (Paperback)
Loot Price: R1,223
Discovery Miles 12 230
You Save: R107
(8%)
|
|
Effective Cybersecurity - A Guide to Using Best Practices and Standards (Paperback)
Expected to ship within 12 - 17 working days
|
William Stallings' Effective Cybersecurity offers a comprehensive
and unified explanation of the best practices and standards that
represent proven, consensus techniques for implementing
cybersecurity. Stallings draws on the immense work that has been
collected in multiple key security documents, making this knowledge
far more accessible than it has ever been before. Effective
Cybersecurity is organized to align with the comprehensive
Information Security Forum document The Standard of Good Practice
for Information Security, but deepens, extends, and complements
ISF's work with extensive insights from the ISO 27002 Code of
Practice for Information Security Controls, the NIST Framework for
Improving Critical Infrastructure Cybersecurity, COBIT 5 for
Information Security, and a wide spectrum of standards and
guidelines documents from ISO, ITU-T, NIST, Internet RFCs, other
official sources, and the professional, academic, and industry
literature. In a single expert source, current and aspiring
cybersecurity practitioners will find comprehensive and usable
practices for successfully implementing cybersecurity within any
organization. Stallings covers: Security Planning: Developing
approaches for managing and controlling the cybersecurity function;
defining the requirements specific to a given IT environment; and
developing policies and procedures for managing the security
function Security Management: Implementing the controls to satisfy
the defined security requirements Security Evaluation: Assuring
that the security management function enables business continuity;
monitoring, assessing, and improving the suite of cybersecurity
controls. Beyond requiring a basic understanding of cryptographic
terminology and applications, this book is self-contained: all
technology areas are explained without requiring other reference
material. Each chapter contains a clear technical overview, as well
as a detailed discussion of action items and appropriate policies.
Stallings, author of 13 TAA Computer Science Textbooks of the Year,
offers many pedagogical features designed to help readers master
the material. These include: clear learning objectives, keyword
lists, and glossaries to QR codes linking to relevant standards
documents and web resources.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.