|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn957493508 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
160829s2016 inua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCO
|d OCLCF
|d OCLCO
|d TOH
|d STF
|d COO
|d DEBBG
|d DEBSZ
|d OCLCA
|d CEF
|d KSU
|d OCLCQ
|d VT2
|d UKMGB
|d WYU
|d UAB
|d AU@
|d RDF
|d OCLCO
|d DST
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBB7I9874
|2 bnb
|
016 |
7 |
|
|a 017838259
|2 Uk
|
019 |
|
|
|a 964907182
|
020 |
|
|
|a 1119207460
|
020 |
|
|
|a 9781119207467
|
020 |
|
|
|a 1119207479
|
020 |
|
|
|a 9781119207474
|
020 |
|
|
|z 9781119207467
|
020 |
|
|
|z 9781119207474
|
020 |
|
|
|a 9781119278658
|
020 |
|
|
|a 1119278651
|
029 |
1 |
|
|a DEBBG
|b BV043970017
|
029 |
1 |
|
|a DEBSZ
|b 485805499
|
029 |
1 |
|
|a GBVCP
|b 88275923X
|
029 |
1 |
|
|a UKMGB
|b 017838259
|
035 |
|
|
|a (OCoLC)957493508
|z (OCoLC)964907182
|
037 |
|
|
|a CL0500000776
|b Safari Books Online
|
050 |
|
4 |
|a QA76.3
|
082 |
0 |
4 |
|a 005.8076
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
4 |
|a The official (ISC)2 guide to the SSCP CBK /
|c Adam Gordon and Steven Hernandez.
|
246 |
3 |
|
|a Official International Information System Security Certification Consortium guide to the Systems Security Certified Practitioner common body of knowledge
|
250 |
|
|
|a Third edition.
|
264 |
|
1 |
|a Indianapolis, IN :
|b Sybex,
|c [2016]
|
264 |
|
4 |
|c ©2016
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed August 29, 2016).
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a The Official (ISC)2® Guide to the SSCP® CBK®; Foreword; Introduction; Domain 1: Access Controls; Objectives; Access Control Concepts; Applying Logical Access Control in Terms of Subjects; Applying Logical Access Control in Terms of Objects or Object Groups; Implementing Access Controls; Discretionary Access Control; Role-Based Access Controls; Nondiscretionary Access Control; Mandatory Access Control; Attribute-Based Access Control; Security Architecture and Models; Bell-LaPadula Confidentiality Model 8; Biba9 and Clark-Wilson Integrity Models10; Additional Models
|
505 |
8 |
|
|a Implementing Authentication Mechanisms-Identification, Authentication, Authorization, and AccountabilityIdentification (Who Is the Subject?); Authentication (Proof of Identity); Authorization; Authentication Using Kerberos; User/Device Authentication Policies; Comparing Internetwork Trust Architectures; Internet; Intranet; Extranet; Demilitarized Zone (DMZ); Trust Direction; One-Way Trust; Two-Way Trust; Trust Transitivity; Administering the Identity Management Lifecycle; Authorization; Proofing; Provisioning; Maintenance; Entitlement; Summary; Sample Questions; Notes
|
505 |
8 |
|
|a Domain 2: Security OperationsObjectives; Code of Ethics; Code of Ethics Preamble; Code of Ethics Canons; Applying a Code of Ethics to Security Practitioners; Security Program Objectives: The C-I-A Triad and Beyond; Confidentiality; Integrity; Availability; Non-Repudiation; Privacy; Security Best Practices; Designing a Security Architecture; Secure Development and Acquisition Lifecycles; System Vulnerabilities, Secure Development, and Acquisition Practices; Hardware/Software; Data; Disclosure Controls: Data Leakage Prevention; Technical Controls ; Operational Controls; Managerial Controls
|
505 |
8 |
|
|a Implementation and Release ManagementSystems Assurance and Controls Validation; Change Control and Management; Configuration Management; Security Impact Assessment; System Architecture/Interoperability of Systems; Patch Management; Monitoring System Integrity; Security Awareness and Training; Interior Intrusion Detection Systems; Building and Inside Security; Securing Communications and Server Rooms; Restricted and Work Area Security; Data Center Security; Summary; Sample Questions; Notes; Domain 3: Risk, Identification, Monitoring, and Analysis; Objectives; Introduction to Risk Management
|
505 |
8 |
|
|a Risk Management ConceptsSecurity Auditing Overview; Responding to an Audit; Exit Interview; Presentation of Audit Findings; Management Response; Security Assessment Activities; Vulnerability Scanning and Analysis; Penetration Testing; Operating and Maintaining Monitoring Systems; Security Monitoring Concepts; Attackers; Intrusions; Events; Types of Monitoring; Log Files; Source Systems; Security Analytics, Metrics, and Trends; Visualization; Event Data Analysis; Communication of Findings; Going Hands-on-Risk Identification Exercise; Virtual Testing Environment; Creating the Environment
|
520 |
|
|
|a The (ISC) 2 Systems Security Certified Practitioner (SSCP) certification is one of the most popular and ideal credential for those wanting to expand their security career and highlight their security skills. If you are looking to embark on the journey towards your (SSCP) certification then the Official (ISC) 2 Guide to the SSCP CBK is your trusted study companion. This step-by-step, updated 3 rd Edition provides expert instruction and extensive coverage of all 7 domains and makes learning and retaining easy through real-life scenarios, sample exam questions, illustrated examples, tables, and best practices and techniques. Endorsed by (ISC)² and compiled and reviewed by leading experts, you will be confident going into exam day. Easy-to-follow content guides you through Major topics and subtopics within the 7 domains Detailed description of exam format Exam registration and administration policies Clear, concise, instruction from SSCP certified experts will provide the confidence you need on test day and beyond . Official (ISC) 2 Guide to the SSCP CBK is your ticket to becoming a Systems Security Certified Practitioner (SSCP) and more seasoned information security practitioner.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification.
|
650 |
|
0 |
|a Telecommunications engineers
|x Certification.
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Examinations
|v Study guides.
|
650 |
|
6 |
|a Sécurité informatique
|x Examens
|v Guides de l'étudiant.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Examinations.
|2 fast
|0 (OCoLC)fst00872343
|
650 |
|
7 |
|a Computer security
|x Examinations.
|2 fast
|0 (OCoLC)fst00872489
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification.
|2 fast
|0 (OCoLC)fst00907100
|
650 |
|
7 |
|a Telecommunications engineers
|x Certification.
|2 fast
|0 (OCoLC)fst01146096
|
655 |
|
7 |
|a Study guides.
|2 fast
|0 (OCoLC)fst01423888
|
700 |
1 |
|
|a Gordon, Adam
|c (IT professional),
|e editor.
|
700 |
1 |
|
|a Hernandez, Steven,
|e editor.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119207467/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|