رکورد قبلیرکورد بعدی

" The official (ISC)² CISSP CBK reference / "


Document Type : BL
Record Number : 840339
Main Entry : Warsinske, John
Title & Author : The official (ISC)² CISSP CBK reference /\ John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
Edition Statement : Fifth edition.
Publication Statement : Hoboken, NJ :: Sybex,, 2019.
Page. NO : 1 online resource
ISBN : 1119423309
: : 1119423317
: : 1119423325
: : 9781119423300
: : 9781119423317
: : 9781119423324
: 9781119423348
Contents : Intro; CISSP The Official (ISC)2® CISSP® CBK® Reference; Lead Author and Lead Technical Reviewer; Contributing Authors; Technical Reviewers; Contents at a Glance; Contents; Foreword; Introduction; Security and Risk Management; Asset Security; Security Architecture and Engineering; Communication and Network Security; Identity and Access Management (IAM); Security Assessment and Testing; Security Operations; Software Development Security; Domain 1: Security and Risk Management; Understand and Apply Concepts of Confidentiality, Integrity, and Availability; Information Security
: Data DocumentationData Organization; Identify and Classify Information and Assets; Asset Classification; Determine and Maintain Information and Asset Ownership; Asset Management Lifecycle; Software Asset Management; Protect Privacy; Cross-Border Privacy and Data Flow Protection; Data Owners; Data Controllers; Data Processors; Data Stewards; Data Custodians; Data Remanence; Data Sovereignty; Data Localization or Residency; Government and Law Enforcement Access to Data; Collection Limitation; Understanding Data States; Data Issues with Emerging Technologies; Ensure Appropriate Asset Retention
: Develop, Document, and Implement Security Policy, Standards, Procedures, and GuidelinesOrganizational Documents; Policy Development; Policy Review Process; Identify, Analyze, and Prioritize Business Continuity Requirements; Develop and Document Scope and Plan; Risk Assessment; Business Impact Analysis; Develop the Business Continuity Plan; Contribute to and Enforce Personnel Security Policies and Procedures; Key Control Principles; Candidate Screening and Hiring; Onboarding and Termination Processes; Vendor, Consultant, and Contractor Agreements and Controls; Privacy in the Workplace
: Evaluate and Apply Security Governance PrinciplesAlignment of Security Functions to Business Strategy, Goals, Mission, and Objectives; Vision, Mission, and Strategy; Governance; Due Care; Determine Compliance Requirements; Legal Compliance; Jurisdiction; Legal Tradition; Legal Compliance Expectations; Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context; Cyber Crimes and Data Breaches; Privacy; Understand, Adhere to, and Promote Professional Ethics; Ethical Decision-Making; Established Standards of Ethical Conduct; (ISC)² Ethical Practices
: Understand and Apply Risk Management ConceptsRisk; Risk Management Frameworks; Risk Assessment Methodologies; Understand and Apply Threat Modeling Concepts and Methodologies; Threat Modeling Concepts; Threat Modeling Methodologies; Apply Risk-Based Management Concepts to the Supply Chain; Supply Chain Risks; Supply Chain Risk Management; Establish and Maintain a Security Awareness, Education, and Training Program; Security Awareness Overview; Developing an Awareness Program; Training; Summary; Domain 2: Asset Security; Asset Security Concepts; Data Policy; Data Governance; Data Quality
Subject : Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.
Subject : Computer networks-- Security measures-- Examinations, Study guides.
Subject : Computers-- Access control-- Examinations, Study guides.
Subject : Telecommunications engineers-- Certification-- United States.
Subject : BUSINESS ECONOMICS-- Industrial Management.
Subject : BUSINESS ECONOMICS-- Management Science.
Subject : BUSINESS ECONOMICS-- Management.
Subject : BUSINESS ECONOMICS-- Organizational Behavior.
Subject : Computer networks-- Security measures-- Examinations.
Subject : Telecommunications engineers-- Certification.
Subject : United States.
Dewey Classification : ‭658.4/78076‬
LC Classification : ‭TK5105.59‬
Added Entry : Graff, Mark
: Henry, Kevin
: Hoover, Christopher
: Malisow, Ben
: Murphy, Sean
: Oakes, Charles
: Pajari, George
: Parker, Jeff T.
: Seidl, David
: Vasquez, Mike
Parallel Title : Official ISC2 CISSP CBK reference
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟