• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Official (ISC)2 Guide to the SSCP CBK » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC

Official (ISC)2 Guide to the SSCP CBK

ISBN-13: 9781439804834 / Angielski / Twarda / 2010 / 468 str.

Contesti Diana-Lynn
Official (ISC)2 Guide to the SSCP CBK Contesti Diana-Lynn 9781439804834 Auerbach Publications - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Official (ISC)2 Guide to the SSCP CBK

ISBN-13: 9781439804834 / Angielski / Twarda / 2010 / 468 str.

Contesti Diana-Lynn
cena 349,00
(netto: 332,38 VAT:  5%)

Najniższa cena z 30 dni: 347,53
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

The (ISC) (r) Systems Security Certified Practitioner (SSCP(r)) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK(r) has quickly become the book that many of today s security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC) CBK.

Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text:

  • Presents widely recognized best practices and techniques used by the world's most experienced administrators
  • Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding
  • Prepares you to join the thousands of practitioners worldwide who have obtained (ISC) certification

Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges. "

Kategorie:
Informatyka, Sieci komputerowe
Kategorie BISAC:
Computers > Networking - General
Computers > Security - General
Wydawca:
Auerbach Publications
Język:
Angielski
ISBN-13:
9781439804834
Rok wydania:
2010
Numer serii:
000323126
Ilość stron:
468
Waga:
0.79 kg
Wymiary:
23.5x15.6
Oprawa:
Twarda
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Access Controls; Paul Henry
Access Control Concepts
Architecture Models
Identification, Authentication, Authorization, and Accountability
Remote Access Methods
Other Access Control Areas
Sample Questions

Cryptography; Christopher M. Nowell
The Basics
Symmetric Cryptography
General Cryptography
Specific Hashes
Specific Protocols
X.509
Sample Questions

Malicious Code; Ken Dunham
Introduction to Windows Malcode Security Management
Malcode Naming Conventions and Types
Brief History of Malcode
Vectors of Infection
Payloads
Identifying Infections
Behavioral Analysis of Malcode
Malcode Mitigation
Sample Questions

Monitoring and Analysis; Mike Mackrill
Policy, Controls, and Enforcement
Audit
Monitoring
Sample Questions

Networks and Telecommunications; Eric Waxvik and Samuel Chun
Introduction to Networks and Telecommunications
Network Protocols and Security Characteristics
Data Communications and Network Infrastructure Components and Security Characteristics
Wireless Local Area Networking
Sample Questions

Security Operations and Administration; C. Karen Stopford
Security Program Objectives: The C-I-A Triad
Code of Ethics
Security Best Practices
Designing a Security Architecture
Security Program Frameworks
Aligning Business, IT, and Security
Security Architecture and Models
Access Control Models
Identity and Access Management
Managing Privileged User Accounts
Outsourcing Security and Managed Security Service Providers
Business Partner Security Controls
Security Policies, Standards, Guidelines, and Procedures
Considerations for Safeguarding Confidentiality
Privacy and Monitoring
Information Life Cycle
Protecting Confidentiality and Information Classification
Information Handling Policy
Information Collection
Secure Information Storage
Secure Output
Record Retention and Disposal
Disclosure Controls: Data Leakage Prevention
Secure Application Development
Web Application Vulnerabilities and Secure Development Practices
Implementation and Release Management
Systems Assurance and Controls Validation
Certification and Accreditation
Security Assurance Rating: Common Criteria
Change Control
Configuration Management
Patch Management
Monitoring System Integrity
Endpoint Protection
Thin Client Implementations
Metrics
Security Awareness and Training
Review Questions
References

Risk, Response, and Recovery; Chris Trautwein
Introduction to Risk Management
Incident Response
Forensics
Recovery

Appendix: Questions and Answers
Access Controls
Cryptography
Malicious Code
Monitoring and Analysis
Networks and Telecommunications
Risk, Response, and Recovery
Security Operations and Administration

Index



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia