The official (ISC)² CISSP CBK reference
by
Warsinske, John, author.
Title
:
The official (ISC)² CISSP CBK reference
Author
:
Warsinske, John, author.
ISBN
:
9781119423300
9781119423324
9781119423317
Edition
:
Fifth edition.
Physical Description
:
1 online resource
Contents
:
Intro; CISSP The Official (ISC)2® CISSP® CBK® Reference; Lead Author and Lead Technical Reviewer; Contributing Authors; Technical Reviewers; Contents at a Glance; Contents; Foreword; Introduction; Security and Risk Management; Asset Security; Security Architecture and Engineering; Communication and Network Security; Identity and Access Management (IAM); Security Assessment and Testing; Security Operations; Software Development Security; Domain 1: Security and Risk Management; Understand and Apply Concepts of Confidentiality, Integrity, and Availability; Information Security
Evaluate and Apply Security Governance PrinciplesAlignment of Security Functions to Business Strategy, Goals, Mission, and Objectives; Vision, Mission, and Strategy; Governance; Due Care; Determine Compliance Requirements; Legal Compliance; Jurisdiction; Legal Tradition; Legal Compliance Expectations; Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context; Cyber Crimes and Data Breaches; Privacy; Understand, Adhere to, and Promote Professional Ethics; Ethical Decision-Making; Established Standards of Ethical Conduct; (ISC)² Ethical Practices
Develop, Document, and Implement Security Policy, Standards, Procedures, and GuidelinesOrganizational Documents; Policy Development; Policy Review Process; Identify, Analyze, and Prioritize Business Continuity Requirements; Develop and Document Scope and Plan; Risk Assessment; Business Impact Analysis; Develop the Business Continuity Plan; Contribute to and Enforce Personnel Security Policies and Procedures; Key Control Principles; Candidate Screening and Hiring; Onboarding and Termination Processes; Vendor, Consultant, and Contractor Agreements and Controls; Privacy in the Workplace
Understand and Apply Risk Management ConceptsRisk; Risk Management Frameworks; Risk Assessment Methodologies; Understand and Apply Threat Modeling Concepts and Methodologies; Threat Modeling Concepts; Threat Modeling Methodologies; Apply Risk-Based Management Concepts to the Supply Chain; Supply Chain Risks; Supply Chain Risk Management; Establish and Maintain a Security Awareness, Education, and Training Program; Security Awareness Overview; Developing an Awareness Program; Training; Summary; Domain 2: Asset Security; Asset Security Concepts; Data Policy; Data Governance; Data Quality
Data DocumentationData Organization; Identify and Classify Information and Assets; Asset Classification; Determine and Maintain Information and Asset Ownership; Asset Management Lifecycle; Software Asset Management; Protect Privacy; Cross-Border Privacy and Data Flow Protection; Data Owners; Data Controllers; Data Processors; Data Stewards; Data Custodians; Data Remanence; Data Sovereignty; Data Localization or Residency; Government and Law Enforcement Access to Data; Collection Limitation; Understanding Data States; Data Issues with Emerging Technologies; Ensure Appropriate Asset Retention
Local Note
:
John Wiley and Sons
Subject Term
:
Computer networks -- Security measures -- Examinations -- Study guides.
Computers -- Access control -- Examinations -- Study guides.
Administrative agencies -- Information resources management -- Security measures -- United States -- Examinations -- Study guides.
Telecommunications engineers -- Certification -- United States.
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
Ordinateurs -- Accès -- Contrôle -- Examens -- Guides de l'étudiant.
Administration publique -- Gestion de l'information -- États-Unis -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
BUSINESS & ECONOMICS -- Industrial Management.
BUSINESS & ECONOMICS -- Management.
BUSINESS & ECONOMICS -- Management Science.
BUSINESS & ECONOMICS -- Organizational Behavior.
Computer networks -- Security measures -- Examinations
Telecommunications engineers -- Certification
Geographic Term
:
United States
Genre
:
examination study guides.
Study guides
Study guides.
Guides de l'étudiant.
Added Author
:
Graff, Mark,
Henry, Kevin,
Hoover, Christopher,
Malisow, Ben,
Murphy, Sean,
Oakes, Charles,
Pajari, George,
Parker, Jeff T.,
Seidl, David,
Vasquez, Mike,
Electronic Access
:
| Library | Material Type | Item Barcode | Shelf Number | [[missing key: search.ChildField.HOLDING]] | Status |
|---|
| Online Library | E-Book | 595207-1001 | TK5105.59 | | Wiley E-Kitap Koleksiyonu |