Photo 1/2


Galerie
Photo 1/2


Vous en avez un à vendre ?
Guide officiel (ISC)2 du livre papier CISSP CBK (ISC2 Press) The Fast Free
FREE US DELIVERY | ISBN: 0849382319 | Quality Books
12,77 USD
Environ11,02 EUR
État :
Bon état
Livre ayant déjà été lu, mais qui est toujours en bon état. La couverture présente des dommages mineurs, comme des éraflures, mais n'est ni trouée ni déchirée. Pour les couvertures rigides, la jaquette n'est pas nécessairement incluse. La reliure présente des marques d'usure mineures. La majorité des pages sont intactes. Pliures et déchirures mineures. Soulignement de texte mineur au crayon. Aucun surlignement de texte. Aucune note dans les marges. Aucune page manquante. Consulter l'annonce du vendeur pour avoir plus de détails et voir la description des défauts.
2 disponibles
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Livraison :
Gratuit USPS Ground Advantage®.
Lieu où se trouve l'objet : Florida, États-Unis
Délai de livraison :
Estimé entre le jeu. 14 août et le mer. 20 août à 94104
Retours :
Retour sous 30 jours. L'acheteur paie les frais de retour. Si vous utilisez un bordereau d'affranchissement eBay, son coût sera déduit du montant de votre remboursement.
Paiements :
Achetez en toute confiance
Le vendeur assume l'entière responsabilité de cette annonce.
Numéro de l'objet eBay :304025562780
Dernière mise à jour le 21 févr. 2025 14:03:23 CET. Afficher toutes les modificationsAfficher toutes les modifications
Caractéristiques de l'objet
- État
- ISBN
- 0849382319
- EAN
- 9780849382314
- Date of Publication
- 2006-11-14
- Release Title
- Official (ISC)2 Guide to the CISSP CBK (ISC2 Press)
- Artist
- various
- Brand
- N/A
- Colour
- N/A
- Book Title
- Official (ISC)2 Guide to the CISSP CBK (ISC2 Press)
À propos de ce produit
Product Information
The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry's first and only CBK(R), a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK continues to serve as the basis for (ISC)2's education and certification programs. Unique and exceptionally thorough, the Official (ISC) 2 (R) Guide to the CISSP (R) CBK (R) provides a better understanding of the CISSP CBK -- a collection of topics relevant to information security professionals around the world. Although the book still contains the ten domains of the CISSP, some of the domain titles have been revised to reflect evolving terminology and changing emphasis in the security professional's day-to-day environment. The ten domains include information security and risk management, access control, cryptography, physical (environmental) security, security architecture and design, business continuity (BCP) and disaster recovery planning (DRP), telecommunications and network security, application security, operations security, legal, regulations, and compliance and investigations. Endorsed by the (ISC)2, this valuable resource follows the newly revised CISSP CBK, providing reliable, current, and thorough information. Moreover, the Official (ISC) 2 (R) Guide to the CISSP (R) CBK (R) helps information security professionals gain awareness of the requirements of their profession and acquire knowledge validated by the CISSP certification. The book is packaged with a CD that is an invaluable tool for those seeking certification. It includes sample exams that simulate the actual exam, providing the same number and types of questions with the same allotment of time allowed. It even grades the exam, provides correct answers, and identifies areas where more study is needed.
Product Identifiers
Publisher
Auerbach Publishers, Incorporated
ISBN-10
0849382319
ISBN-13
9780849382314
eBay Product ID (ePID)
52874343
Product Key Features
Number of Pages
1112 Pages
Language
English
Publication Name
Official (Isc) 2 Guide to the Cissp Cbk
Publication Year
2006
Subject
Security / General, Certification Guides / General, Commerce, Information Technology
Type
Textbook
Subject Area
Computers, Business & Economics
Series
(Isc) 2 Press Ser.
Format
Hardcover
Dimensions
Item Height
2.2 in
Item Weight
60.1 Oz
Item Length
9.6 in
Item Width
6.5 in
Additional Product Features
Edition Number
2
LCCN
2006-043032
Dewey Edition
22
Target Audience
Scholarly & Professional
Illustrated
Yes
Dewey Decimal
004.6
Lc Classification Number
Qa76.3.T565 2006
Table of Content
INFORMATION SECURITY AND RISK MANAGEMENT Introduction The Business Case for Information Security Management Core Information Security Principles: Availability, Integrity, Information Security Management Governance Organizational Behavior Security Awareness, Training, and Education Risk Management Ethics Data Classification Policy Data Handling Policy References Other References Sample Questions ACCESS CONTROL Introduction Definitions and Key Concepts Access Control Categories and Types Access Control Threats Access to Systems Access to Data Intrusion Detection and Prevention Systems Access Control Assurance References. Sample Questions CRYPTOGRAPHY Introduction Key Concepts and Definitions Encryption Systems Message Integrity Controls Digital Signatures Encryption Management Cryptanalysis and Attacks Encryption Usage References Sample Questions PHYSICAL (ENVIRONMENTAL) SECURITY Introduction Site Location The Layered Defense Model Information Protection and Management Services Summary References Sample Questions SECURITY ARCHITECTURE AND DESIGN Introduction Security Architecture and Design Components and Principles Security Models and Architecture Theory Security Product Evaluation Methods and Criteria Sample Questions BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Introduction Organization of the BCP/DRP Domain Chapter Terminology Appendix A: Addressing Legislative Compliance within Business Continuity Plans TELECOMMUNICATIONS AND NETWORK SECURITY Introduction Basic Concepts Layer 1: Physical Layer Layer 2: Data-Link Layer Layer 3: Network Layer Layer 4: Transport Layer Layer 5: Session Layer Layer 6: Presentation Layer Layer 7: Application Layer Trivial File Transfer Protocol (TFTP) General References Sample Questions Endnotes APPLICATION SECURITY Domain Description and Introduction Applications Development and Programming Concepts and Protection Audit and Assurance Mechanisms Malicious Software (Malware) The Database and Data Warehousing Environment Web Application Environment Summary References OPERATIONS SECURITY Introduction Privileged Entity Controls Resource Protection Continuity of Operations Change Control Management Summary References Sample Questions LEGAL, REGULATIONS, COMPLIANCE AND INVESTIGATIONS Introduction Major Legal Systems Information Technology Laws and Regulations Incident Response Computer Forensics Conclusions References Sample Questions ANSWERS TO SAMPLE QUESTIONS CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP®) CANDIDATE INFORMATION BULLETIN GLOSSARY INDEX
Description de l'objet fournie par le vendeur
Informations sur le vendeur professionnel
Numéro de TVA : GB 922696893
À propos de ce vendeur
World of Books USA
87,1% d'évaluations positives•5,2 millions objets vendus
Inscrit comme vendeur professionnel
Évaluations du vendeur (1.559.967)
- m***a (249)- Évaluations laissées par l'acheteur.Dernier moisAchat vérifiéa good transaction
- k***a (198)- Évaluations laissées par l'acheteur.Dernier moisAchat vérifié🤙🏼
- d***m (732)- Évaluations laissées par l'acheteur.Dernier moisAchat vérifiéAs described quick delivery