Effective Cybersecurity Understanding and Using Standards and Best Practices
"In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implement...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Upper Saddle River, NJ
Addison-Wesley Professional
2019
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam a2200000#i 4501 | ||
---|---|---|---|
001 | wils-1001083 | ||
005 | 20248178145 | ||
008 | 241216t2019 NJU a## ##001 #deng|D | ||
020 | # | # | |a 9780134772806 |q paperback |
020 | # | # | |a 0134772806 |q paperback |
040 | # | # | |a TOH |d UiTM |e rda |
090 | 0 | 0 | |a QA76.9.A25 |b S686 2019 |
100 | 1 | # | |a Stallings, William |e author |
245 | 1 | 0 | |a Effective Cybersecurity |b Understanding and Using Standards and Best Practices |c William Stallings |
246 | 1 | 4 | |a Effective cybersecurity: a guide to using best practices and standards |
264 | # | 1 | |a Upper Saddle River, NJ |b Addison-Wesley Professional |c 2019 |
264 | # | 4 | |c ©2019 |
300 | # | # | |a xxxi, 768 pages |b illustrations |c 24 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
504 | # | # | |a Includes bibliographical references (pages 694-707) and index |
520 | # | # | |a "In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the 'how' of implementation, integrated into a unified framework and realistic plan of action. Effective Cybersecurity aligns with the comprehensive Information Security Forum document 'The Standard of Good Practice for Information Security,' extending ISF's work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature. This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable"-- |c Back cover |
526 | 0 | # | |a UCS422 |b BA243 |5 FBM |
526 | 0 | # | |a Introduction To Cyber Security for Non-Computing Science |b Bachelor of Business Administration (Hons) Human Resource Management |5 Faculty of Business and Management |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Computer security |x Standards |
650 | # | 0 | |a Information technology |x Management |x Security measures |
650 | # | 0 | |a Computer networks |x Security measures |
650 | # | 0 | |a Internet |x Security measures |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=1001083 |
998 | # | # | |a 00250##a006.2.2||00250##b006.2.2||00255##a006.2.2||00260##a006.2.2||00260##b006.2.2||00260##c006.2.2||00264#1a006.2.2||00264#1b006.2.2||00300##a006.2.2||00300##b006.2.2||00300##c006.2.2||00500##a006.2.2||00502##a006.2.2||00520##a006.2.2||00520##b006.2.2||00538##a006.2.2||00546##a006.2.2||00730##a006.2.2||00730##d006.4||00730##f006.10||00730##n006.2.2||00730##p006.2.2|| |