A Guide to Using Best Practices and Standards
|Price||$47.99 - $57.14
|Format||Paper book / ebook (PDF)|
In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the "how" of implementation, integrated into a unified framework and realistic plan of action.
Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material: clear learning objectives, keyword lists, review questions, and QR codes linking to relevant standards documents and web resources.
Effective Cybersecurity aligns with the comprehensive Information Security Forum document "The Standard of Good Practice for Information Security", extending ISF's work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature.
Understand the cybersecurity discipline and the role of standards and best practices; Define security governance, assess risks, and manage strategy and tactics; Safeguard information and privacy, and ensure GDPR compliance; Harden systems across the system development life cycle (SDLC); Protect servers, virtualized systems, and storage; Secure networks and electronic communications, from email to VoIP; Apply the most appropriate methods for user authentication; Mitigate security risks in supply chains and cloud environments.
This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable.
4 5 2
by Jonathan Anderson, John McRee, Robb Wilson, The EffectiveUI Team
Effective UI provides a complete roadmap to building groundbreaking software centered on user experience (UX) quality, how to get management support, employing product management strategies proven to deliver greater success, and how to manage the design, engineering, staffing, and business considerations that must be centered on the user'...
Price: $24.77 | Publisher: O'Reilly Media | Release: 2010
by Fernando Maymi, Brent Chapman
This highly effective self-study system provides complete coverage of every objective for the challenging CompTIA CySA+ Cybersecurity Analyst exam. You'll find learning objectives at the beginning of each chapter, exam tips, in-depth explanations, and practice exam questions. All questions closely mirror those on the live test in content,...
Price: $36.99 | Publisher: McGraw-Hill | Release: 2017
by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, de...
Price: $35.00 | Publisher: Apress | Release: 2015
by Scott Donaldson, Stanley Siegel, Chris Williams, Abdul Aslam
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Progr...
Price: $37.85 | Publisher: Apress | Release: 2018
by Morey J. Haber, Brad Hibbert
Build an effective vulnerability management strategy to protect your organization's assets, applications, and data.Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly ...
Price: $22.94 | Publisher: Apress | Release: 2018
by Eric C. Thompson
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.Surviving an incident, or a breach, requires the best r...
Price: $24.90 | Publisher: Apress | Release: 2018
by Joshua Bloch
Java has changed dramatically since the previous edition of Effective Java was published shortly after the release of Java 6. This Jolt award-winning classic has now been thoroughly updated to take full advantage of the latest language and library features. The support in modern Java for multiple paradigms increases the need for specific ...
Price: $25.34 | Publisher: Addison-Wesley | Release: 2017
by Joshua Bloch
Are you looking for a deeper understanding of the Java programming language so that you can write code that is clearer, more correct, more robust, and more reusable? Look no further! Effective Java, 2nd Edition, brings together seventy-eight indispensable programmer's rules of thumb: working, best-practice solutions for the programming ch...
Price: $4.48 | Publisher: Addison-Wesley | Release: 2008