Samenvatting
All-in-One is all you need! This authoritative reference offers complete coverage of all material on the Certified Information Systems Security Practitioner (CISSP) exam. You’ll find exam objectives at the beginning of each chapter, helpful exam tips, end-of-chapter practice questions, and photographs and illustrations. The bonus CD-ROM contains practice tests and hundreds of questions. This comprehensive guide not only helps you pass this challenging certification exam, but will also serve as an invaluable on-the-job reference.
Specificaties
ISBN13:9780072193534
Taal:Engels
Bindwijze:gebonden
Uitgever:McGraw-Hill Education
Hoofdrubriek:
Lezersrecensies
Wees de eerste die een lezersrecensie schrijft!
Geef uw waardering
Inhoudsopgave
Chapter 1: Reasons to Become a CISSP Chapter 2: Security Trends Chapter 3: Security Management Practices Chapter 4: Access Control Chapter 5: Security Models and Architecture Chapter 6: Physical Security Chapter 7: Telecommunications and Networking Security Chapter 8: Cryptography Chapter 9: Disaster Recovery and Business Continuity Chapter 10: Law, Investigation, and Ethics Chapter 11: Application and System Development Chapter 12: Operations Security Appendix A: Security Policies Appendix B: British Standard 7799 Appendix C: Who’s Who? Appendix D: Gramm Leach Bliley Act Appendix E: Various Networking Components Appendix F: Why Many Security Implementations Die in Motivation and End Up Half Baked Appendix G: Your Company’s Rights versus Your Employees’ Rights
Chapter 3: Security Management Practices Chapter 4: Access Control Chapter 5: Security Models and Architecture Chapter 6: Physical Security Chapter 7: Telecommunications and Networking Security Chapter 8: Cryptography Chapter 9: Disaster Recovery and Business Continuity Chapter 10: Law, Investigation, and Ethics Chapter 11: Application and System Development Chapter 12: Operations Security Appendix A: Security Policies Appendix B: British Standard 7799 Appendix C: Who’s Who? Appendix D: Gramm Leach Bliley Act Appendix E: Various Networking Components Appendix F: Why Many Security Implementations Die in Motivation and End Up Half Baked Appendix G: Your Company’s Rights versus Your Employees’ Rights
Chapter 5: Security Models and Architecture Chapter 6: Physical Security Chapter 7: Telecommunications and Networking Security Chapter 8: Cryptography Chapter 9: Disaster Recovery and Business Continuity Chapter 10: Law, Investigation, and Ethics Chapter 11: Application and System Development Chapter 12: Operations Security Appendix A: Security Policies Appendix B: British Standard 7799 Appendix C: Who’s Who? Appendix D: Gramm Leach Bliley Act Appendix E: Various Networking Components Appendix F: Why Many Security Implementations Die in Motivation and End Up Half Baked Appendix G: Your Company’s Rights versus Your Employees’ Rights
Chapter 7: Telecommunications and Networking Security Chapter 8: Cryptography Chapter 9: Disaster Recovery and Business Continuity Chapter 10: Law, Investigation, and Ethics Chapter 11: Application and System Development Chapter 12: Operations Security Appendix A: Security Policies Appendix B: British Standard 7799 Appendix C: Who’s Who? Appendix D: Gramm Leach Bliley Act Appendix E: Various Networking Components Appendix F: Why Many Security Implementations Die in Motivation and End Up Half Baked Appendix G: Your Company’s Rights versus Your Employees’ Rights
Chapter 9: Disaster Recovery and Business Continuity Chapter 10: Law, Investigation, and Ethics Chapter 11: Application and System Development Chapter 12: Operations Security Appendix A: Security Policies Appendix B: British Standard 7799 Appendix C: Who’s Who? Appendix D: Gramm Leach Bliley Act Appendix E: Various Networking Components Appendix F: Why Many Security Implementations Die in Motivation and End Up Half Baked Appendix G: Your Company’s Rights versus Your Employees’ Rights
Chapter 11: Application and System Development Chapter 12: Operations Security Appendix A: Security Policies Appendix B: British Standard 7799 Appendix C: Who’s Who? Appendix D: Gramm Leach Bliley Act Appendix E: Various Networking Components Appendix F: Why Many Security Implementations Die in Motivation and End Up Half Baked Appendix G: Your Company’s Rights versus Your Employees’ Rights
Appendix A: Security Policies Appendix B: British Standard 7799 Appendix C: Who’s Who? Appendix D: Gramm Leach Bliley Act Appendix E: Various Networking Components Appendix F: Why Many Security Implementations Die in Motivation and End Up Half Baked Appendix G: Your Company’s Rights versus Your Employees’ Rights
Appendix C: Who’s Who? Appendix D: Gramm Leach Bliley Act Appendix E: Various Networking Components Appendix F: Why Many Security Implementations Die in Motivation and End Up Half Baked Appendix G: Your Company’s Rights versus Your Employees’ Rights
Appendix E: Various Networking Components Appendix F: Why Many Security Implementations Die in Motivation and End Up Half Baked Appendix G: Your Company’s Rights versus Your Employees’ Rights
Appendix G: Your Company’s Rights versus Your Employees’ Rights
Alle 100 bestsellers
Rubrieken
- Advisering
- Algemeen management
- Coaching en trainen
- Communicatie en media
- Financieel management
- Inkoop en logistiek
- Internet en social media
- IT-management / ICT
- Juridisch
- Leiderschap
- Marketing
- Non-profit
- Ondernemen
- Organisatiekunde
- Personal finance
- Personeelsmanagement
- Persoonlijke effectiviteit
- Projectmanagement
- Psychologie
- Reclame en verkoop
- Strategisch management
- Verandermanagement
- Werk en loopbaan