The official (ISC)² CISSP CBK reference
tarafından
 
Warsinske, John, author.

Başlık
The official (ISC)² CISSP CBK reference

Yazar
Warsinske, John, author.

ISBN
9781119423300
 
9781119423324
 
9781119423317

Basım Bilgisi
Fifth edition.

Fiziksel Tanımlama
1 online resource

İçerik
Intro; CISSP The Official (ISC)2® CISSP® CBK® Reference; Lead Author and Lead Technical Reviewer; Contributing Authors; Technical Reviewers; Contents at a Glance; Contents; Foreword; Introduction; Security and Risk Management; Asset Security; Security Architecture and Engineering; Communication and Network Security; Identity and Access Management (IAM); Security Assessment and Testing; Security Operations; Software Development Security; Domain 1: Security and Risk Management; Understand and Apply Concepts of Confidentiality, Integrity, and Availability; Information Security
 
Evaluate and Apply Security Governance PrinciplesAlignment of Security Functions to Business Strategy, Goals, Mission, and Objectives; Vision, Mission, and Strategy; Governance; Due Care; Determine Compliance Requirements; Legal Compliance; Jurisdiction; Legal Tradition; Legal Compliance Expectations; Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context; Cyber Crimes and Data Breaches; Privacy; Understand, Adhere to, and Promote Professional Ethics; Ethical Decision-Making; Established Standards of Ethical Conduct; (ISC)² Ethical Practices
 
Develop, Document, and Implement Security Policy, Standards, Procedures, and GuidelinesOrganizational Documents; Policy Development; Policy Review Process; Identify, Analyze, and Prioritize Business Continuity Requirements; Develop and Document Scope and Plan; Risk Assessment; Business Impact Analysis; Develop the Business Continuity Plan; Contribute to and Enforce Personnel Security Policies and Procedures; Key Control Principles; Candidate Screening and Hiring; Onboarding and Termination Processes; Vendor, Consultant, and Contractor Agreements and Controls; Privacy in the Workplace
 
Understand and Apply Risk Management ConceptsRisk; Risk Management Frameworks; Risk Assessment Methodologies; Understand and Apply Threat Modeling Concepts and Methodologies; Threat Modeling Concepts; Threat Modeling Methodologies; Apply Risk-Based Management Concepts to the Supply Chain; Supply Chain Risks; Supply Chain Risk Management; Establish and Maintain a Security Awareness, Education, and Training Program; Security Awareness Overview; Developing an Awareness Program; Training; Summary; Domain 2: Asset Security; Asset Security Concepts; Data Policy; Data Governance; Data Quality
 
Data DocumentationData Organization; Identify and Classify Information and Assets; Asset Classification; Determine and Maintain Information and Asset Ownership; Asset Management Lifecycle; Software Asset Management; Protect Privacy; Cross-Border Privacy and Data Flow Protection; Data Owners; Data Controllers; Data Processors; Data Stewards; Data Custodians; Data Remanence; Data Sovereignty; Data Localization or Residency; Government and Law Enforcement Access to Data; Collection Limitation; Understanding Data States; Data Issues with Emerging Technologies; Ensure Appropriate Asset Retention

Notlar
John Wiley and Sons

Konu Terimleri
Computer networks -- Security measures -- Examinations -- Study guides.
 
Computers -- Access control -- Examinations -- Study guides.
 
Administrative agencies -- Information resources management -- Security measures -- United States -- Examinations -- Study guides.
 
Telecommunications engineers -- Certification -- United States.
 
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
 
Ordinateurs -- Accès -- Contrôle -- Examens -- Guides de l'étudiant.
 
Administration publique -- Gestion de l'information -- États-Unis -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
 
BUSINESS & ECONOMICS -- Industrial Management.
 
BUSINESS & ECONOMICS -- Management.
 
BUSINESS & ECONOMICS -- Management Science.
 
BUSINESS & ECONOMICS -- Organizational Behavior.
 
Computer networks -- Security measures -- Examinations
 
Telecommunications engineers -- Certification

Coğrafi Terim
United States

Tür
examination study guides.
 
Study guides
 
Study guides.
 
Guides de l'étudiant.

Yazar Ek Girişi
Graff, Mark,
 
Henry, Kevin,
 
Hoover, Christopher,
 
Malisow, Ben,
 
Murphy, Sean,
 
Oakes, Charles,
 
Pajari, George,
 
Parker, Jeff T.,
 
Seidl, David,
 
Vasquez, Mike,

Elektronik Erişim
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119423300


KütüphaneMateryal TürüDemirbaş NumarasıYer Numarası[[missing key: search.ChildField.HOLDING]]Durumu/İade Tarihi
Çevrimiçi KütüphaneE-Kitap595207-1001TK5105.59Wiley E-Kitap Koleksiyonu