The Official (ISC)2 CISSP CBK Reference - Kraus, Aaron
- Format: Relié Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre109,28 €
Produit Neuf
Ou 27,32 € /mois
- Livraison à 0,01 €
- Livré entre le 4 et le 11 mai
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781119789994_dbm
Nos autres offres
-
111,01 €
Produit Neuf
Ou 27,75 € /mois
- Livraison à 0,01 €
Nouvel article expédié dans le 24H à partir des Etats Unis Livraison au bout de 20 à 30 jours ouvrables.
-
107,69 €
Produit Neuf
Ou 26,92 € /mois
- Livraison : 3,99 €
- Livré entre le 4 et le 9 mai
-
116,62 €
Produit Neuf
Ou 29,16 € /mois
- Livraison à 0,01 €
- Livré entre le 16 et le 28 mai
Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.
-
92,16 €
Occasion · Comme Neuf
Ou 23,04 € /mois
- Livraison : 25,00 €
- Livré entre le 11 et le 21 mai
Service client à l'écoute et une politique de retour sans tracas - Livraison des USA en 3 a 4 semaines (2 mois si circonstances exceptionnelles) - La plupart de nos titres sont en anglais, sauf indication contraire. N'hésitez pas à nous envoyer un e-... Voir plus -
133,15 €
Produit Neuf
Ou 33,29 € /mois
- Livraison : 5,00 €
- Livré entre le 4 et le 7 mai
Exp¿di¿ en 7 jours ouvr¿s
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur The Official (Isc)2 Cissp Cbk Reference de Kraus, Aaron Format Relié - Livre Informatique
0 avis sur The Official (Isc)2 Cissp Cbk Reference de Kraus, Aaron Format Relié - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Canine Rehabilitation And Physical Therapy
Neuf dès 156,59 €
Occasion dès 123,46 €
-
Conformal Field Theory
Neuf dès 190,65 €
Occasion dès 130,39 €
-
Art Of Modern Rock
2 avis
Occasion dès 50,00 €
-
Fotografias 1976 - 2003 Photographs 1976 - 2003
Occasion dès 120,00 €
-
Diego Rivera. The Complete Murals
Neuf dès 97,04 €
Occasion dès 65,00 €
-
Guerre Et Paix - Tomes 1 Et 2
6 avis
Occasion dès 116,90 €
-
Francois Catroux
Occasion dès 71,38 €
-
Arda Reconstructed
Neuf dès 67,42 €
-
Hollywood Jewels: Movies, Jewelry, Stars
Occasion dès 106,99 €
-
Martin Chambi: 1920-1950 (Spanish Edition)
Occasion dès 87,72 €
-
Le Medecin Des Pauvres: 2000 Remèdes Et Savoirs De La Médecine Populaire (Édition Illustrée)
Occasion dès 65,89 €
-
Bernard Frize: Longues Lignes (Souvent Fermees)
Occasion dès 63,99 €
-
Pomellato
Occasion dès 80,00 €
-
La Sante Interdite
Occasion dès 71,00 €
-
Warehouse Management
Neuf dès 66,26 €
-
Storm Chasing Handbook, 2nd. Ed.
Neuf dès 64,46 €
-
Dosso Dossi: Court Painter In Renaissance Ferrara
Occasion dès 55,00 €
-
Professional Goldsmithing : A Contemporary Guide To Traditional Jewelry Techniques
Occasion dès 110,38 €
-
On Greek Religion
Neuf dès 46,50 €
Occasion dès 80,99 €
-
Yngwie Malmsteen Anthology
1 avis
Neuf dès 49,99 €
Produits similaires
Présentation The Official (Isc)2 Cissp Cbk Reference de Kraus, Aaron Format Relié
- Livre Informatique
Résumé : Foreword xix Domain 1: Security and Risk Management 1 Domain 2: Asset Security 97
Introduction xxi
Understand, Adhere to, and Promote Professional Ethics 2
(ISC)2 Code of Professional Ethics 2
Organizational Code of Ethics 3
Understand and Apply Security Concepts 4
Confidentiality 4
Integrity 5
Availability 6
Limitations of the CIA Triad 7
Evaluate and Apply Security Governance Principles 8
Alignment of the Security Function to Business Strategy, Goals, Mission, and Objectives 9
Organizational Processes 10
Organizational Roles and Responsibilities 14
Security Control Frameworks 15
Due Care and Due Diligence 22
Determine Compliance and Other Requirements 23
Legislative and Regulatory Requirements 23
Industry Standards and Other Compliance Requirements 25
Privacy Requirements 27
Understand Legal and Regulatory Issues That Pertain to Information Security in a Holistic Context 28
Cybercrimes and Data Breaches 28
Licensing and Intellectual Property Requirements 36
Import/Export Controls 39
Transborder Data Flow 40
Privacy 41
Understand Requirements for Investigation Types 48
Administrative 49
Criminal 50
Civil 52
Regulatory 53
Industry Standards 54
Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines 55
Policies 55
Standards 56
Procedures 57
Guidelines 57
Identify, Analyze, and Prioritize Business Continuity Requirements 58
Business Impact Analysis 59
Develop and Document the Scope and the Plan 61
Contribute to and Enforce Personnel Security Policies and Procedures 63
Candidate Screening and Hiring 63
Employment Agreements and Policies 64
Onboarding, Transfers, and Termination Processes 65
Vendor, Consultant, and Contractor Agreements and Controls 67
Compliance Policy Requirements 67
Privacy Policy Requirements 68
Understand and Apply Risk Management Concepts 68
Identify Threats and Vulnerabilities 68
Risk Assessment 70
Risk Response/Treatment 72
Countermeasure Selection and Implementation 73
pplicable Types of Controls 75
Control Assessments 76
Monitoring and Measurement 77
Reporting 77
Continuous Improvement 78
Risk Frameworks 78
Understand and Apply Threat Modeling Concepts and Methodologies 83
Threat Modeling Concepts 84
Threat Modeling Methodologies 85
Apply Supply Chain Risk Management Concepts 88
Risks Associated with Hardware, Software, and Services 88
Third-Party Assessment and Monitoring 89
Minimum Security Requirements 90
Service-Level
Requirements 90
Frameworks 91
Establish and Maintain a Security Awareness, Education, and Training Program 92
Methods and Techniques to Present Awareness and Training 93
Periodic Content Reviews 94
Program Effectiveness Evaluation 94
Summary 95
Identify and Classify Information and Assets 97
Data Classification and Data Categorization 99
Asset Classification 101
Establish Information and Asset Handling Requirements 104
Marking and Labeling 104
Handling 105
Storage 105
Declassification 106
Provision Resources Securely 108
Information and Asset Ownership 108
Asset Inventory 109
Asset Management 112
Manage Data Lifecycle 115
Data Roles 116
Data Collection 120
Data Location 120
Data Maintenance 121
Data Retention 122
Data Destruction 123
Data Remanence 123
Ensure Appropriate Asset Retention 127
Determining Appropriate Records Retention 129
Records Retention Best Practices 130
Determine Data Security Controls and Compliance Requirements 131
D...
Biographie:
..
Sommaire: The only official, comprehensive reference guide to the CISSP Thoroughly updated for 2021 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the CISSP credential meets the stringent requirements of ISO/IEC Standard 17024. This CBK covers the current eight domains of CISSP with the necessary depth to apply them to the daily practice of information security. Revised and updated by a team of subject matter experts, this comprehensive reference covers all of the more than 300 CISSP objectives and sub-objectives in a structured format with: Whether you've earned your CISSP credential or are looking for a valuable resource to help advance your security career, this comprehensive guide offers everything you need to apply the knowledge of the most recognized body of influence in information security.
Détails de conformité du produit
Personne responsable dans l'UE