| 000 | 03093cam a2200397 i 4500 | ||
|---|---|---|---|
| 999 |
_c11732 _d11732 |
||
| 005 | 20200203151123.0 | ||
| 008 | 180412t20192019njua b 001 0 eng d | ||
| 020 | _a9780134772806 | ||
| 020 | _a0134772806 | ||
| 040 |
_aTOH _beng _cTOH _erda _dYDX _dOCLCO _dOCLCF _dIUL _dUPM _dAU@ _dAUMLT _dUWO _dFWA _dDLC |
||
| 042 | _alccopycat | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bS686 2019 |
| 082 | 0 | 4 |
_a005.8 _223 _bS.W.E |
| 100 | 1 |
_aStallings, William _eauthor. _9562 _d1945- |
|
| 245 | 1 | 0 |
_aEffective cybersecurity : _bunderstanding and using standards and best practices / _cWilliam Stallings. |
| 246 | 1 | 4 | _aEffective cybersecurity: a guide to using best practices and standards |
| 264 | 1 |
_aUpper Saddle River, NJ : _bAddison-Wesley, _c[2019] |
|
| 300 |
_axxxi, 768 pages : _billustrations ; _c24 cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 504 | _aIncludes bibliographical references (pages 694-707) and index. | ||
| 505 | 0 | _a1. Guides to Practical Cybersecurity2. Security Governance3. Information Risk Assessment4. Security Management5. People Management6. Information Management7. Physical Asset Management8. System Development9. Business Applications Management10. System Access11. System Management12. Networks and Communications13. Supply Chain Management14. Technical Security Management15. Threat and Incident Management16. Local Environment Management Part Three: Security Monitoring and Improvement17. Business Continuity18. Security Monitoring and Improvement | |
| 520 | _a"In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the 'how' of implementation, integrated into a unified framework and realistic plan of action. Effective Cybersecurity aligns with the comprehensive Information Security Forum document 'The Standard of Good Practice for Information Security,' extending ISF's work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature. This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable"--Back cover. | ||
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aComputer security _xStandards. |
|
| 650 | 0 |
_aInformation technology _xManagement _xSecurity measures. |
|
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 |
_aInternet _xSecurity measures. |
|
| 650 | 7 |
_aCOMPUTERS / Security / General. _2bisacsh |
|
| 650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
| 650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
| 650 | 7 |
_aComputer security _xStandards. _2fast _0(OCoLC)fst00872495 |
|
| 650 | 7 |
_aInternet _xSecurity measures. _2fast _0(OCoLC)fst01751426 |
|
| 942 |
_2ddc _cBK |
||