|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_on1224365388 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
201128s2020 nyu o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e rda
|c EBLCP
|d YDX
|d N$T
|d OCLCO
|d OCLCF
|d CNWPU
|d YDX
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1224161026
|a 1224199246
|
020 |
|
|
|a 1260463931
|
020 |
|
|
|a 9781260463934
|q (electronic bk.)
|
020 |
|
|
|z 1260463923
|
020 |
|
|
|z 9781260463927
|
035 |
|
|
|a (OCoLC)1224365388
|z (OCoLC)1224161026
|z (OCoLC)1224199246
|
050 |
|
4 |
|a QA76.9.A25
|b B46 2020
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Bennett, Steve.
|
245 |
1 |
0 |
|a CCISO Certified Chief Information Security Officer All-In-One Exam Guide.
|
260 |
|
|
|a New York :
|b McGraw-Hill Education,
|c 2020.
|
300 |
|
|
|a 1 online resource (459 p.)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Governance and Risk Management -- Governance -- Information Security Governance -- Information Security Management Structure -- Sizing -- Management Structure -- Principles of Information Security -- The CIA Triad -- Security Vulnerabilities, Threats, Risks, and Exposures -- Cyberattack Elements -- Defense-In-Depth -- Risk Management -- Risk Management Program -- Best Practice Frameworks for Risk Management -- Management and Technical Information Security Elements
|
505 |
8 |
|
|a Security Program Plan -- Security Policies, Standards, and Guidelines -- Asset Security -- Identity and Access Management -- Security Engineering -- Physical Security -- Security Operations -- Software Development Security -- Security Assessments and Testing -- Security Training and Awareness -- Business Continuity and Disaster Recovery -- Compliance -- Compliance Team -- Compliance Management -- Privacy -- Privacy Impact Assessment -- Privacy and Security -- Laws and Regulatory Drivers -- Federal Information Security Modernization Act
|
505 |
8 |
|
|a Defense Federal Acquisition Regulation Supplement 252.204-7012 -- Clinger-Cohen Act -- Payment Card Industry Data Security Standard -- Privacy Act of 1974 -- Gramm-Leach-Bliley Act -- Health Insurance Portability and Accountability Act -- Family Educational Rights and Privacy Act -- Sarbanes-Oxley Act -- General Data Protection Regulation -- North American Electric Reliability Corporation Critical Infrastructure Protection -- Summary of Laws and Regulatory Drivers -- Standards and Frameworks -- ISO/IEC 27000 Series -- ISO/IEC 27001 -- NIST Cybersecurity Framework
|
505 |
8 |
|
|a Federal Information Processing Standards -- NIST Special Publications -- Privacy Shield -- COBIT -- Information Security Trends and Best Practices -- Open Web Application Security Project -- Cloud Security Alliance -- Center for Internet Security -- Information Security Training and Certifications -- International Information System Security Certification Consortium -- ISACA -- International Council of E-Commerce Consultants -- SANS Institute -- Computing Technology Industry Association -- International Association of Privacy Professionals -- Offensive Security -- Ethics -- Chapter Review
|
505 |
8 |
|
|a Quick Review -- Questions -- Answers -- Chapter 2 Information Security Controls, Compliance, and Audit Management -- Information Security Controls -- Control Fundamentals -- Control Frameworks -- Information Security Control Life Cycle Frameworks -- NIST Risk Management Framework -- NIST Cybersecurity Framework -- ISO/IEC 27000 -- Information Security Control Life Cycle -- Step 1: Risk Assessment -- Step 2: Design -- Step 3: Implementation -- Step 4: Assessment -- Step 5: Monitoring -- Exploring Information Security Control Frameworks -- NIST SP 800-53 -- NIST Cybersecurity Framework
|
500 |
|
|
|a ISO/IEC 27002.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|v Examinations, questions, etc.
|
650 |
|
0 |
|a Computer networks
|x Examinations
|v Examinations, questions, etc.
|
650 |
|
6 |
|a Sécurité informatique
|v Examens, questions, etc.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Examens
|v Examens, questions, etc.
|
650 |
|
7 |
|a COMPUTERS / Certification Guides / General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Examinations.
|2 fast
|0 (OCoLC)fst00872313
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
655 |
|
7 |
|a Examinations.
|2 fast
|0 (OCoLC)fst01423780
|
700 |
1 |
|
|a Genung, Jordan.
|
776 |
0 |
8 |
|i Print version:
|a Bennett, Steve
|t CCISO Certified Chief Information Security Officer All-In-One Exam Guide
|d New York : McGraw-Hill Education,c2020
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781260463934/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6403891
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17129324
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2688561
|
994 |
|
|
|a 92
|b IZTAP
|