Cargando…

The official (ISC)2 guide to the SSCP CBK /

The (ISC) 2 Systems Security Certified Practitioner (SSCP) certification is one of the most popular and ideal credential for those wanting to expand their security career and highlight their security skills. If you are looking to embark on the journey towards your (SSCP) certification then the Offic...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Gordon, Adam (IT professional) (Editor ), Hernandez, Steven (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Sybex, [2016]
Edición:Third edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn957493508
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 160829s2016 inua ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCO  |d OCLCF  |d OCLCO  |d TOH  |d STF  |d COO  |d DEBBG  |d DEBSZ  |d OCLCA  |d CEF  |d KSU  |d OCLCQ  |d VT2  |d UKMGB  |d WYU  |d UAB  |d AU@  |d RDF  |d OCLCO  |d DST  |d OCLCO  |d OCLCQ 
015 |a GBB7I9874  |2 bnb 
016 7 |a 017838259  |2 Uk 
019 |a 964907182 
020 |a 1119207460 
020 |a 9781119207467 
020 |a 1119207479 
020 |a 9781119207474 
020 |z 9781119207467 
020 |z 9781119207474 
020 |a 9781119278658 
020 |a 1119278651 
029 1 |a DEBBG  |b BV043970017 
029 1 |a DEBSZ  |b 485805499 
029 1 |a GBVCP  |b 88275923X 
029 1 |a UKMGB  |b 017838259 
035 |a (OCoLC)957493508  |z (OCoLC)964907182 
037 |a CL0500000776  |b Safari Books Online 
050 4 |a QA76.3 
082 0 4 |a 005.8076  |2 23 
049 |a UAMI 
245 0 4 |a The official (ISC)2 guide to the SSCP CBK /  |c Adam Gordon and Steven Hernandez. 
246 3 |a Official International Information System Security Certification Consortium guide to the Systems Security Certified Practitioner common body of knowledge 
250 |a Third edition. 
264 1 |a Indianapolis, IN :  |b Sybex,  |c [2016] 
264 4 |c ©2016 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed August 29, 2016). 
504 |a Includes bibliographical references. 
505 0 |a The Official (ISC)2® Guide to the SSCP® CBK®; Foreword; Introduction; Domain 1: Access Controls; Objectives; Access Control Concepts; Applying Logical Access Control in Terms of Subjects; Applying Logical Access Control in Terms of Objects or Object Groups; Implementing Access Controls; Discretionary Access Control; Role-Based Access Controls; Nondiscretionary Access Control; Mandatory Access Control; Attribute-Based Access Control; Security Architecture and Models; Bell-LaPadula Confidentiality Model 8; Biba9 and Clark-Wilson Integrity Models10; Additional Models 
505 8 |a Implementing Authentication Mechanisms-Identification, Authentication, Authorization, and AccountabilityIdentification (Who Is the Subject?); Authentication (Proof of Identity); Authorization; Authentication Using Kerberos; User/Device Authentication Policies; Comparing Internetwork Trust Architectures; Internet; Intranet; Extranet; Demilitarized Zone (DMZ); Trust Direction; One-Way Trust; Two-Way Trust; Trust Transitivity; Administering the Identity Management Lifecycle; Authorization; Proofing; Provisioning; Maintenance; Entitlement; Summary; Sample Questions; Notes 
505 8 |a Domain 2: Security OperationsObjectives; Code of Ethics; Code of Ethics Preamble; Code of Ethics Canons; Applying a Code of Ethics to Security Practitioners; Security Program Objectives: The C-I-A Triad and Beyond; Confidentiality; Integrity; Availability; Non-Repudiation; Privacy; Security Best Practices; Designing a Security Architecture; Secure Development and Acquisition Lifecycles; System Vulnerabilities, Secure Development, and Acquisition Practices; Hardware/Software; Data; Disclosure Controls: Data Leakage Prevention; Technical Controls ; Operational Controls; Managerial Controls 
505 8 |a Implementation and Release ManagementSystems Assurance and Controls Validation; Change Control and Management; Configuration Management; Security Impact Assessment; System Architecture/Interoperability of Systems; Patch Management; Monitoring System Integrity; Security Awareness and Training; Interior Intrusion Detection Systems; Building and Inside Security; Securing Communications and Server Rooms; Restricted and Work Area Security; Data Center Security; Summary; Sample Questions; Notes; Domain 3: Risk, Identification, Monitoring, and Analysis; Objectives; Introduction to Risk Management 
505 8 |a Risk Management ConceptsSecurity Auditing Overview; Responding to an Audit; Exit Interview; Presentation of Audit Findings; Management Response; Security Assessment Activities; Vulnerability Scanning and Analysis; Penetration Testing; Operating and Maintaining Monitoring Systems; Security Monitoring Concepts; Attackers; Intrusions; Events; Types of Monitoring; Log Files; Source Systems; Security Analytics, Metrics, and Trends; Visualization; Event Data Analysis; Communication of Findings; Going Hands-on-Risk Identification Exercise; Virtual Testing Environment; Creating the Environment 
520 |a The (ISC) 2 Systems Security Certified Practitioner (SSCP) certification is one of the most popular and ideal credential for those wanting to expand their security career and highlight their security skills. If you are looking to embark on the journey towards your (SSCP) certification then the Official (ISC) 2 Guide to the SSCP CBK is your trusted study companion. This step-by-step, updated 3 rd Edition provides expert instruction and extensive coverage of all 7 domains and makes learning and retaining easy through real-life scenarios, sample exam questions, illustrated examples, tables, and best practices and techniques. Endorsed by (ISC)² and compiled and reviewed by leading experts, you will be confident going into exam day. Easy-to-follow content guides you through Major topics and subtopics within the 7 domains Detailed description of exam format Exam registration and administration policies Clear, concise, instruction from SSCP certified experts will provide the confidence you need on test day and beyond . Official (ISC) 2 Guide to the SSCP CBK is your ticket to becoming a Systems Security Certified Practitioner (SSCP) and more seasoned information security practitioner. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Electronic data processing personnel  |x Certification. 
650 0 |a Telecommunications engineers  |x Certification. 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 0 |a Computer networks  |x Security measures  |x Examinations  |v Study guides. 
650 6 |a Sécurité informatique  |x Examens  |v Guides de l'étudiant. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Examens  |v Guides de l'étudiant. 
650 7 |a Computer networks  |x Security measures  |x Examinations.  |2 fast  |0 (OCoLC)fst00872343 
650 7 |a Computer security  |x Examinations.  |2 fast  |0 (OCoLC)fst00872489 
650 7 |a Electronic data processing personnel  |x Certification.  |2 fast  |0 (OCoLC)fst00907100 
650 7 |a Telecommunications engineers  |x Certification.  |2 fast  |0 (OCoLC)fst01146096 
655 7 |a Study guides.  |2 fast  |0 (OCoLC)fst01423888 
700 1 |a Gordon, Adam  |c (IT professional),  |e editor. 
700 1 |a Hernandez, Steven,  |e editor. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119207467/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP