000 03093cam a2200397 i 4500
999 _c11732
_d11732
005 20200203151123.0
008 180412t20192019njua b 001 0 eng d
020 _a9780134772806
020 _a0134772806
040 _aTOH
_beng
_cTOH
_erda
_dYDX
_dOCLCO
_dOCLCF
_dIUL
_dUPM
_dAU@
_dAUMLT
_dUWO
_dFWA
_dDLC
042 _alccopycat
050 0 0 _aQA76.9.A25
_bS686 2019
082 0 4 _a005.8
_223
_bS.W.E
100 1 _aStallings, William
_eauthor.
_9562
_d1945-
245 1 0 _aEffective cybersecurity :
_bunderstanding and using standards and best practices /
_cWilliam Stallings.
246 1 4 _aEffective cybersecurity: a guide to using best practices and standards
264 1 _aUpper Saddle River, NJ :
_bAddison-Wesley,
_c[2019]
300 _axxxi, 768 pages :
_billustrations ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references (pages 694-707) and index.
505 0 _a1. Guides to Practical Cybersecurity2. Security Governance3. Information Risk Assessment4. Security Management5. People Management6. Information Management7. Physical Asset Management8. System Development9. Business Applications Management10. System Access11. System Management12. Networks and Communications13. Supply Chain Management14. Technical Security Management15. Threat and Incident Management16. Local Environment Management Part Three: Security Monitoring and Improvement17. Business Continuity18. Security Monitoring and Improvement
520 _a"In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the 'how' of implementation, integrated into a unified framework and realistic plan of action. Effective Cybersecurity aligns with the comprehensive Information Security Forum document 'The Standard of Good Practice for Information Security,' extending ISF's work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature. This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable"--Back cover.
650 0 _aComputer security.
650 0 _aComputer security
_xStandards.
650 0 _aInformation technology
_xManagement
_xSecurity measures.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aInternet
_xSecurity measures.
650 7 _aCOMPUTERS / Security / General.
_2bisacsh
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
650 7 _aComputer security
_xStandards.
_2fast
_0(OCoLC)fst00872495
650 7 _aInternet
_xSecurity measures.
_2fast
_0(OCoLC)fst01751426
942 _2ddc
_cBK