Cargando…

CCISO Certified Chief Information Security Officer All-In-One Exam Guide.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bennett, Steve
Otros Autores: Genung, Jordan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, 2020.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_on1224365388
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 201128s2020 nyu o ||| 0 eng d
040 |a EBLCP  |b eng  |e rda  |c EBLCP  |d YDX  |d N$T  |d OCLCO  |d OCLCF  |d CNWPU  |d YDX  |d OCLCO  |d OCLCQ 
019 |a 1224161026  |a 1224199246 
020 |a 1260463931 
020 |a 9781260463934  |q (electronic bk.) 
020 |z 1260463923 
020 |z 9781260463927 
035 |a (OCoLC)1224365388  |z (OCoLC)1224161026  |z (OCoLC)1224199246 
050 4 |a QA76.9.A25  |b B46 2020 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Bennett, Steve. 
245 1 0 |a CCISO Certified Chief Information Security Officer All-In-One Exam Guide. 
260 |a New York :  |b McGraw-Hill Education,  |c 2020. 
300 |a 1 online resource (459 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Governance and Risk Management -- Governance -- Information Security Governance -- Information Security Management Structure -- Sizing -- Management Structure -- Principles of Information Security -- The CIA Triad -- Security Vulnerabilities, Threats, Risks, and Exposures -- Cyberattack Elements -- Defense-In-Depth -- Risk Management -- Risk Management Program -- Best Practice Frameworks for Risk Management -- Management and Technical Information Security Elements 
505 8 |a Security Program Plan -- Security Policies, Standards, and Guidelines -- Asset Security -- Identity and Access Management -- Security Engineering -- Physical Security -- Security Operations -- Software Development Security -- Security Assessments and Testing -- Security Training and Awareness -- Business Continuity and Disaster Recovery -- Compliance -- Compliance Team -- Compliance Management -- Privacy -- Privacy Impact Assessment -- Privacy and Security -- Laws and Regulatory Drivers -- Federal Information Security Modernization Act 
505 8 |a Defense Federal Acquisition Regulation Supplement 252.204-7012 -- Clinger-Cohen Act -- Payment Card Industry Data Security Standard -- Privacy Act of 1974 -- Gramm-Leach-Bliley Act -- Health Insurance Portability and Accountability Act -- Family Educational Rights and Privacy Act -- Sarbanes-Oxley Act -- General Data Protection Regulation -- North American Electric Reliability Corporation Critical Infrastructure Protection -- Summary of Laws and Regulatory Drivers -- Standards and Frameworks -- ISO/IEC 27000 Series -- ISO/IEC 27001 -- NIST Cybersecurity Framework 
505 8 |a Federal Information Processing Standards -- NIST Special Publications -- Privacy Shield -- COBIT -- Information Security Trends and Best Practices -- Open Web Application Security Project -- Cloud Security Alliance -- Center for Internet Security -- Information Security Training and Certifications -- International Information System Security Certification Consortium -- ISACA -- International Council of E-Commerce Consultants -- SANS Institute -- Computing Technology Industry Association -- International Association of Privacy Professionals -- Offensive Security -- Ethics -- Chapter Review 
505 8 |a Quick Review -- Questions -- Answers -- Chapter 2 Information Security Controls, Compliance, and Audit Management -- Information Security Controls -- Control Fundamentals -- Control Frameworks -- Information Security Control Life Cycle Frameworks -- NIST Risk Management Framework -- NIST Cybersecurity Framework -- ISO/IEC 27000 -- Information Security Control Life Cycle -- Step 1: Risk Assessment -- Step 2: Design -- Step 3: Implementation -- Step 4: Assessment -- Step 5: Monitoring -- Exploring Information Security Control Frameworks -- NIST SP 800-53 -- NIST Cybersecurity Framework 
500 |a ISO/IEC 27002. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |v Examinations, questions, etc. 
650 0 |a Computer networks  |x Examinations  |v Examinations, questions, etc. 
650 6 |a Sécurité informatique  |v Examens, questions, etc. 
650 6 |a Réseaux d'ordinateurs  |x Examens  |v Examens, questions, etc. 
650 7 |a COMPUTERS / Certification Guides / General.  |2 bisacsh 
650 7 |a Computer networks  |x Examinations.  |2 fast  |0 (OCoLC)fst00872313 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
655 7 |a Examinations.  |2 fast  |0 (OCoLC)fst01423780 
700 1 |a Genung, Jordan. 
776 0 8 |i Print version:  |a Bennett, Steve  |t CCISO Certified Chief Information Security Officer All-In-One Exam Guide  |d New York : McGraw-Hill Education,c2020 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781260463934/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6403891 
938 |a YBP Library Services  |b YANK  |n 17129324 
938 |a EBSCOhost  |b EBSC  |n 2688561 
994 |a 92  |b IZTAP