Effective Cybersecurity: A Guide to Using Best Practices and Standards, 1st edition

Published by Addison-Wesley Professional (July 6, 2021) © 2021

  • William Stallings

Pearson+ subscription

ISBN-13: 9780137570416
Effective Cybersecurity: A Guide to Using Best Practices and Standards
Published 2021

eTextbook features

  • Instant access to eTextbook
  • Search, highlight, and notes
  • Create flashcards
In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the “how” of implementation, integrated into a unified framework and realistic plan of action.

Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material: clear learning objectives, keyword lists, review questions, and QR codes linking to relevant standards documents and web resources.
Effective Cybersecurity aligns with the comprehensive Information Security Forum document “The Standard of Good Practice for Information Security,” extending ISF’s work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature.
  • 1. Guides to Practical Cybersecurity
  • 2. Security Governance
  • 3. Information Risk Assessment
  • 4. Security Management
  • 5. People Management
  • 6. Information Management
  • 7. Physical Asset Management
  • 8. System Development
  • 9. Business Applications Management
  • 10. System Access
  • 11. System Management
  • 12. Networks and Communications
  • 13. Supply Chain Management
  • 14. Technical Security Management
  • 15. Threat and Incident Management
  • 16. Local Environment Management
  • Part Three: Security Monitoring and Improvement
  • 17. Business Continuity
  • 18. Security Monitoring and Improvement

Need help? Get in touch