Effective Cybersecurity A Guide to Using Best Practices and Standards 1st Edition William Stallings pdf download
Effective Cybersecurity A Guide to Using Best Practices and Standards 1st Edition William Stallings pdf download
https://textbookfull.com/product/effective-cybersecurity-a-guide-
to-using-best-practices-and-standards-1st-edition-william-
stallings/
https://textbookfull.com/product/network-security-essentials-
applications-and-standards-6th-edition-william-stallings/
https://textbookfull.com/product/implementing-cybersecurity-a-
guide-to-the-national-institute-of-standards-and-technology-risk-
management-framework-1st-edition-dan-shoemaker/
https://textbookfull.com/product/computer-organization-and-
architecture-9th-edition-william-stallings/
https://textbookfull.com/product/sap-business-analytics-a-best-
practices-guide-for-implementing-business-analytics-using-
sap-1st-edition-sudipa-duttaroy-auth/
Computer Security: Principles and Practice 4th Edition
William Stallings
https://textbookfull.com/product/computer-security-principles-
and-practice-4th-edition-william-stallings/
https://textbookfull.com/product/cybersecurity-law-standards-and-
regulations-tari-schreider/
https://textbookfull.com/product/guide-to-food-safety-and-
quality-during-transportation-second-edition-controls-standards-
and-practices-ryan/
https://textbookfull.com/product/fundamentals-of-software-
architecture-a-comprehensive-guide-to-patterns-characteristics-
and-best-practices-neal-ford/
https://textbookfull.com/product/computer-organization-and-
architecture-designing-for-performance-10th-edition-william-
stallings/
About This E-Book
EPUB is an open, industry-standard format for e-books. However, support
for EPUB and its many features varies across reading devices and
applications. Use your device or app settings to customize the presentation
to your liking. Settings that you can customize often include font, font size,
single or double column, landscape or portrait mode, and figures that you
can click or tap to enlarge. For additional information about the settings and
features on your reading device or app, visit the device manufacturer’s Web
site.
William Stallings
Executive Editor
Brett Bartow
Development Editor
Marianne Bartow
Managing Editor
Sandra Schroeder
Copy Editor
Kitty Wilson
Project Manager
Dhayanidhi Karunanidhi
Indexer
Ken Johnson
Proofreader
Jeanine Furino
Technical Reviewers
Akhil Behl
Michael Shannon
Cover Designer
Chuti Praertsith
Compositor
codemantra
To Tricia, my loving wife, the kindest and gentlest person.
Contents at a Glance
Preface
CHAPTER 1 Best Practices, Standards, and a Plan of Action
Background
Effective cybersecurity is very difficult. A number of organizations, based
on wide professional input, have developed best-practices types of
documents as well as standards for implementing and evaluating
cybersecurity. On the standards side, the most prominent player is the
National Institute of Standards and Technology (NIST). NIST has created a
huge number of security publications, including 9 Federal Information
Processing Standards (FIPS) and well over 100 active Special Publications
(SP) that provide guidance on virtually all aspects of cybersecurity. Equally
important is the International Organization for Standardization (ISO) 27000
series of standards on information security management systems. Other
organizations that have produced cybersecurity standards and guidelines
include:
ISACA/COBIT: The COBIT-5 for information security and related
documents are widely used by the industry.
ITU Telecommunication Standardization Sector (ITU-T): Most
important are the series X.1050 through X.1069 on security
management.
Internet Society (ISOC): A number of published standards and RFCs
relate to cybersecurity.
In addition, a number of professional and industry groups have produced
best-practices documents and guidelines. The most important such
document is The Standard of Good Practice for Information Security
(SGP), produced by the Information Security Forum (ISF). This almost
300-page document provides a wide range of best practices based on the
consensus of industry and government organizations. Another key
organization is the Center for Internet Security (CIS), which has published
detailed lists of industry-approved security controls and metrics. Other
respected organizations have also produced a number of similar documents.
Thus, there is an immense amount of practical, widely accepted material
available. The problem is that the amount of information is so massive that
it is difficult for cybersecurity practitioners to take advantage of it to build
and maintain effective cybersecurity systems and policies.
The objective of this book is to organize, consolidate, and explain all this
material to enable the security practitioner to make effective use of it.
This book is addressed to people in both IT and security management,
people tasked with maintaining IT security, and a wide range of others
interested in cybersecurity and information security.
Supporting Websites
The author maintains a companion website at
WilliamStallings.com/Cybersecurity that includes a list of relevant links
organized by chapter and an errata sheet for the book.
WilliamStallings.com/Cybersecurity Companion website
The author also maintains the Computer Science Student Resource Site at
ComputerScienceStudent.com. The purpose of this site is to provide
documents, information, and links for computer science students and
professionals. Links and documents are organized into seven categories:
Math: Includes a basic math refresher, a queuing analysis primer, a
number system primer, and links to numerous math sites.
How-to: Provides advice and guidance for solving homework
problems, writing technical reports, and preparing technical
presentations.
Research resources: Provides links to important collections of papers,
technical reports, and bibliographies.
Other useful: Provides a variety of other useful documents and links.
Computer science careers: Lists useful links and documents for those
considering a career in computer science.
ComputerScienceStudent.com Computer Science Student Resource Site
BLAS EL GUERRILLERO.
A BANDIT’S STORY.
“La murmuracion, como Hija natural del odio y de la enbidia, siempre anda
procurando como manchar y escurecer las vidas y virtudes agenas. Y assi en la
gente de condicion vil y baja, es la salsa de mayor apetito, sin quien alguna
viando no tiene buen gusto, ni està sazonada.”
“Guzman de Alfarache.”
THE tale which occupies this and the succeeding chapters interested us,
however unworthily, so deeply, that the following day—whilst its details, as
well as the peculiar phrases of the narrator, were yet fresh in our memories
—was chiefly devoted to transmitting them to our journals, in as regular
order as the case would admit of. By a strange coincidence, however,
(which will be noted in the course of my wanderings) an opportunity was
some years afterwards afforded me of revising and correcting my MS.
under the eye of the hero of the tale himself; who, besides adding many
minor details that had escaped our recollection, explained various
circumstances which had struck us as somewhat obscure and
unaccountable.
I leave the tale, however, so far in its original state, as to make our
acquaintance himself relate
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com