|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_ocn958945755 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
160712s2016 enk o 000 0 eng d |
040 |
|
|
|a NLE
|b eng
|e rda
|e pn
|c NLE
|d OCLCF
|d OCLCO
|d EBLCP
|d OCLCQ
|d MERUC
|d IDB
|d OCLCQ
|d LVT
|d OCLCQ
|d UKMGB
|d OCLCO
|d K6U
|d OCLCQ
|d COO
|d VT2
|d REB
|d UOK
|d WYU
|d CNCEN
|d OCLCO
|d OCLCL
|
015 |
|
|
|a GBB6A2300
|2 bnb
|
016 |
7 |
|
|a 017944815
|2 Uk
|
019 |
|
|
|a 963362053
|
020 |
|
|
|a 9781785880704
|q (PDF ebook)
|
020 |
|
|
|a 1785880705
|q (PDF ebook)
|
020 |
|
|
|a 9781785884498
|
020 |
|
|
|a 1785884492
|q (Trade Paper)
|
024 |
3 |
|
|a 9781785884498
|
029 |
1 |
|
|a AU@
|b 000067091249
|
029 |
1 |
|
|a AU@
|b 000068987681
|
029 |
1 |
|
|a CHNEW
|b 000960919
|
029 |
1 |
|
|a CHVBK
|b 491679637
|
029 |
1 |
|
|a UKMGB
|b 017944815
|
035 |
|
|
|a (OCoLC)958945755
|z (OCoLC)963362053
|
037 |
|
|
|a 9781785880704
|b Packt Publishing Pvt. Ltd
|
050 |
|
4 |
|a QA76.3
|b .S65 2016eb
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Srinivasan, M. L.,
|e author.
|
245 |
1 |
0 |
|a CISSP in 21 days /
|c M.L. Srinivasan.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a Birmingham :
|b Packt Publishing,
|c 2016.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a CIP data; resource not viewed.
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Day 1 -- Security and Risk Management -- Security, Compliance, and Policies; Overview of security, compliance, and policies; Asset; Asset protection; Confidentiality, Integrity, and Availability (CIA); Confidentiality; Integrity; Availability; Security governance; Strategy, goals, mission, and objectives; Organizational processes; Security roles and responsibilities; Control frameworks; Management controls; Administrative controls; Technical controls.
|
505 |
8 |
|
|a Due diligence and due careCompliance; Legislative and regulatory compliance; Privacy requirements in compliance; Licensing and intellectual property; Legal and regulatory issues; Computer crimes; Fraud; Theft; Malware/malicious code; Cyber crime; Importing and exporting controls; Transborder data flow; Data breaches; Professional ethics; Codes of ethics; (ISC)sup /2/sup code of professional ethics; Security policies, standards, procedures, and guidelines; Personnel security policies; Employment candidate screening; Employment agreement and policies; Employment termination processes.
|
505 |
8 |
|
|a Vendor, consultant, and contractor controlsCompliance and privacy; Summary; Sample questions; Chapter 2: Day 2 -- Security and Risk Management -- Risk Management, Business Continuity, and Security Education; Overview of risk management, business continuity, and security education; Risk management; Threats, vulnerabilities, and attacks; Threat risk modeling; Threat and vulnerability analysis; Attack analysis; Risk analysis; Quantitative risk analysis; Qualitative risk analysis; Risk treatment; Business continuity management; The Business Continuity Planning (BCP) process; BCP best practices.
|
505 |
8 |
|
|a Security risk considerations in acquisitions, strategy, and practiceInformation security education, training, and awareness; Summary; Sample questions; Chapter 3: Day 3 -- Asset Security -- Information and Asset Classification; Overview of asset security -- information and asset classification; Asset classification and control; Classification types in government; The United States information classification; Classification types in corporations; Data privacy; Data owners; Data processors; Data remanence; Data collection limitations; Data retention; Data in media; Data in hardware.
|
505 |
8 |
|
|a Data with personnelSummary; Sample questions; Chapter 4: Day 4 -- Asset Security -- Data Security Controls and Handling; Overview of asset security -- data security controls and handling; Data security controls; Data security requirements; Payment Card Industry Data Security Standard (PCI DSS); Sarbanes-Oxley Act (SOX); Gramm-Leach-Bliley Act (GLBA); EU Data Protection Act (DPA); Data Loss Prevention (DLP); [Data in motion]; Data in motion; Data at rest; Data in use; Data Loss Prevention strategies; DLP controls; Cryptographic methods to secure data; Encryption; Hashing; Digital signatures.
|
520 |
|
|
|a About This BookDay-by-day plan to study and assimilate core concepts from CISSP CBKRevise and take a mock test at the end of every four chaptersA systematic study and revision of myriad concepts to help you crack the CISSP examinationWho This Book Is For If you are a networking professional aspiring to take the CISSP examination and obtain the coveted CISSP certification (considered to be the Gold Standard in Information Security personal certification), then this book for you. This book assumes that you already have sufficient knowledge in all 10 domains of the CISSP CBK by way of work experience and knowledge gained from other study books. What You Will LearnReview Exam Cram and Practice review questions to reinforce the required conceptsFollow the day-by-day plan to revise important concepts a month before the CISSP® examBoost your time management for the exam by attempting the mock question paperDevelop a structured study plan for all 10 CISSP® domainsBuild your understanding of myriad concepts in the information security domainPractice the full-blown mock test to evaluate your knowledge and exam preparationIn Detail Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. But passing the final exam is challenging. This happens when they cover everything but do not revise properly and hence lack confidence. This simple yet informative book provides concise explanations of important concepts in all 10 domains of the CISSP Common Body of Knowledge (CBK). This book will take you through the final weeks before the exam with a day-by-day plan covering all of the exam topics. It will build your confidence and enable you to crack the Gold Standard exam, knowing that you have.
|
520 |
8 |
|
|a Done all you can to prepare for the big day. This book is not a replacement for full study guides; instead, it builds on and re-emphasizes concepts learned from them.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification.
|
650 |
|
0 |
|a Computer networks
|x Examinations
|v Study guides.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a Computer networks
|x Examinations
|2 fast
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification
|2 fast
|
655 |
|
7 |
|a examination study guides.
|2 aat
|
655 |
|
7 |
|a Study guides
|2 fast
|
655 |
|
7 |
|a Study guides.
|2 lcgft
|
655 |
|
7 |
|a Guides de l'étudiant.
|2 rvmgf
|
758 |
|
|
|i has work:
|a CISSP in 21 Days (Text)
|1 https://id.oclc.org/worldcat/entity/E39PD3jcHw9Kjbw7j69TGCfXh3
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4594266
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4594266
|
994 |
|
|
|a 92
|b IZTAP
|