£38.01

Addison Wesley Effective Cybersecurity: A Guide to Using Best Practices and Standards

Price data checked 1 day ago

View at Amazon

Price History & Forecast

Last 90 days • 90 data points

Historical
Generating forecast...
£39.32 £32.89 £34.29 £35.69 £37.10 £38.50 £39.91 24 January 2026 15 February 2026 09 March 2026 31 March 2026 23 April 2026

Price Distribution

Price distribution over 90 days • 10 price levels

Days at Price
Current Price
5 days 13 days 2 days 1 day 17 days 7 days 23 days 11 days · current 5 days 6 days 0 6 12 17 23 £33 £34 £35 £36 £36 £37 £37 £38 £39 £39 Days at Price

Price Analysis

Most common price: £37 (23 days, 25.6%)

Price range: £33 - £39

Price levels: 10 different prices over 90 days

Description

William Stallings’ Effective Cybersecurity offers a comprehensive and unified explanation of the best practices and standards that represent proven, consensus techniques for implementing cybersecurity. Stallings draws on the immense work that has been collected in multiple key security documents, making this knowledge far more accessible than it has ever been before. Effective Cybersecurity is organized to align with the comprehensive Information Security Forum document The Standard of Good Practice for Information Security, but deepens, extends, and complements ISF’s work with extensive insights from the ISO 27002 Code of Practice for Information Security Controls, the NIST Framework for Improving Critical Infrastructure Cybersecurity, COBIT 5 for Information Security, and a wide spectrum of standards and guidelines documents from ISO, ITU-T, NIST, Internet RFCs, other official sources, and the professional, academic, and industry literature. In a single expert source, current and aspiring cybersecurity practitioners will find comprehensive and usable practices for successfully implementing cybersecurity within any organization. Stallings covers: Security Planning: Developing approaches for managing and controlling the cybersecurity function; defining the requirements specific to a given IT environment; and developing policies and procedures for managing the security function Security Management: Implementing the controls to satisfy the defined security requirements Security Evaluation: Assuring that the security management function enables business continuity; monitoring, assessing, and improving the suite of cybersecurity controls. Beyond requiring a basic understanding of cryptographic terminology and applications, this book is self-contained: all technology areas are explained without requiring other reference material. Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings, author of 13 TAA Computer Science Textbooks of the Year, offers many pedagogical features designed to help readers master the material. These include: clear learning objectives, keyword lists, and glossaries to QR codes linking to relevant standards documents and web resources.

Key Features

Effective Cybersecurity: A Guide to Using Best Practices and Standards

Product type: ABIS BOOK

Addison Wesley

Product Specifications

Format
paperback
Domain
Amazon UK
Release Date
14 November 2018
Listed Since
12 May 2017

Barcode

No barcode data available

Similar Products You Might Like

Building an Effective Security Program
99% match

Building an Effective Security Program

De Gruyter

£41.50 01 Apr 2026
Cyber Security: Critical Infrastructure Protection: 56 (Computational Methods in Applied Sciences, 56)
98% match

Cyber Security: Critical Infrastructure Protection: 56 (Computational Methods in Applied Sciences, 56)

Springer

£120.83 14 Apr 2026
Introduction to Computer Security
98% match

Introduction to Computer Security

ADDISON-WESLEY

£33.41 23 Apr 2026
Responsive Security: Be Ready to Be Secure
98% match

Responsive Security: Be Ready to Be Secure

CRC Press

£157.32 06 Apr 2026
Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil? (Security, Audit and Leadership Series)
98% match

Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil? (Security, Audit and Leadership Series)

CRC Press

£40.48 30 Mar 2026
Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls
98% match

Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls

Apress

£49.99 18 Apr 2026
National Cyber Summit (NCS) Research Track: 1055 (Advances in Intelligent Systems and Computing, 1055)
98% match

National Cyber Summit (NCS) Research Track: 1055 (Advances in Intelligent Systems and Computing, 1055)

Springer

£77.73 18 Apr 2026
Cyber Strategy: Risk-Driven Security and Resiliency
98% match

Cyber Strategy: Risk-Driven Security and Resiliency

CRC Press

£40.19 11 Apr 2026
Information and Communications Security: 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings: 2513 (Lecture Notes in Computer Science, 2513)
98% match

Information and Communications Security: 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings: 2513 (Lecture Notes in Computer Science, 2513)

Springer

£44.58 21 Apr 2026
The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Security, Audit and Leadership Series)
98% match

The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Security, Audit and Leadership Series)

CRC Press

£45.85 11 Apr 2026
Cyber Resilience Index: Mastering Threat-Informed Defense
98% match

Cyber Resilience Index: Mastering Threat-Informed Defense

Apress

£38.87 22 Apr 2026
Strategic Information Security
98% match

Strategic Information Security

CRC Press

£57.91 15 Apr 2026
Risk Assessment and Countermeasures for Cybersecurity
98% match

Risk Assessment and Countermeasures for Cybersecurity

£330.44 11 Apr 2026
Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare
98% match

Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare

Routledge

£41.19 24 Apr 2026
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings: 3225 (Lecture Notes in Computer Science, 3225)
98% match

Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings: 3225 (Lecture Notes in Computer Science, 3225)

Springer

£44.52 21 Apr 2026
Security on the Web: 83 (Advances in Computers): Volume 83
98% match

Security on the Web: 83 (Advances in Computers): Volume 83

Academic Press

£102.12 11 Apr 2026
Protocols for Authentication and Key Establishment (Information Security and Cryptography)
98% match

Protocols for Authentication and Key Establishment (Information Security and Cryptography)

Springer

£86.38 05 Apr 2026
Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation (River Publishers Series in Security and Digital Forensics)
98% match

Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation (River Publishers Series in Security and Digital Forensics)

Taylor & Francis

£32.13 21 Apr 2026
Cyber Security Essentials: Understanding Risk and Controls
98% match

Cyber Security Essentials: Understanding Risk and Controls

KENDALL HUNT PUBLISHING

£53.53 04 Apr 2026
Information Assurance Architecture
98% match

Information Assurance Architecture

CRC Press

£59.27 09 Apr 2026
Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition
98% match

Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition

Wiley

£32.00 06 Apr 2026
Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities: 972 (Studies in Computational Intelligence, 972)
98% match

Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities: 972 (Studies in Computational Intelligence, 972)

Springer

£83.00 11 Apr 2026
Information Assurance: Managing Organizational IT Security Risks
98% match

Information Assurance: Managing Organizational IT Security Risks

Butterworth-Heinemann

£57.50 12 Apr 2026
Machine Intelligence and Big Data Analytics for Cybersecurity Applications: 919 (Studies in Computational Intelligence, 919)
98% match

Machine Intelligence and Big Data Analytics for Cybersecurity Applications: 919 (Studies in Computational Intelligence, 919)

Springer

£147.91 04 Apr 2026