HKSYU Course Resources
MARC Display
LEADER 02693cam a2200421Ii 4500
001
991002337369707546
005
20220928114911.0
008
220305s2019 njua b 001 0 eng d
010
a| 2018941168
020
a| 9780134772806
020
a| 0134772806
035
a| (HKSYU)b21542132-852hksyu_inst
040
a| TOH
b| eng
e| rda
c| TOH
d| YDX
d| OCLCO
d| OCLCF
d| IUL
d| UPM
d| AU@
d| AUMLT
d| UWO
d| FWA
d| WGT
d| HK-SYU
050
4
a| QA76.9.A25
b| S73 2019
082
0
4
a| 005.8
2| 23
092
0
a| 005.8
b| STA 2019
100
1
a| Stallings, William,
e| author
245
1
0
a| Effective cybersecurity :
b| understanding and using standards and best practices /
c| William Stallings
246
1
4
a| Effective cybersecurity :
b| a guide to using best practices and standards
264
1
a| Upper Saddle River, NJ :
b| Addison-Wesley,
c| [2019]
264
4
c| ©2019
300
a| xxxi, 768 pages :
b| illustrations ;
c| 24 cm
336
a| text
b| txt
2| rdacontent
337
a| unmediated
b| n
2| rdamedia
338
a| volume
b| nc
2| rdacarrier
505
0
a| Best Practices, Standards, and a Plan of Action -- Part I: Planning for Cybersecurity -- Part II: Managing the Cybersecurity Function -- Part III: Security Assessment
504
a| Includes bibliographical references (pages 694-707) and index
520
a| "In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the 'how' of implementation, integrated into a unified framework and realistic plan of action. Effective Cybersecurity aligns with the comprehensive Information Security Forum document 'The Standard of Good Practice for Information Security,' extending ISF's work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature. This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable"--Back cover
650
0
a| Computer security
650
0
a| Computer security
x| Standards
650
0
a| Information technology
x| Management
x| Security measures
650
0
a| Computer networks
x| Security measures
650
0
a| Internet
x| Security measures
907
a| b21542132
b| 12-05-22
c| 05-03-22
910
a| nlw
b| mkl
935
a| (HK-SYU)501047985
9| ExL
998
a| book
b| 12-05-22
c| m
d| a
e| -
f| eng
g| nju
h| 0
i| 0
945
h| Supplement
l| location
i| barcode
y| id
f| bookplate
a| callnoa
b| callnob
n| FINT301