Certified information Systems security professional: official study guide
Chapple,Mike
Certified information Systems security professional: official study guide - 9a. Edición - New Jersey, SYBEX; 2021 - 1248 páginas tablas; gráficos 23x18 cm
incluye índice de contenido
Chapter 1: Security Governance Through Principles and Policies.-Chapter 2: Personnel Security and Risk Management Concepts.-Chapter 3: Business Continuity Planning.-Chapter 4: Laws, Regulations, and Compliance.-Chapter 5: Protecting Security of Assets.-Chapter 6: Cryptography and Symmetric Key Algorithms.-Chapter 7: PKI and Cryptographic Applications.-Chapter 8: Principles of Security Models, Design, and Capabilities.-Chapter 9: Security Vulnerabilities, Threats, and Countermeasures.-Chapter 10: Physical Security Requirements.-Chapter 11: Secure Network Architecture and Components.-Chapter 12: Secure Communications and Network Attacks.-Chapter 13: Managing Identity and Authentication.-Chapter 14: Controlling and Monitoring Access.-Chapter 15: Security Assessment and Testing.-Chapter 16: Managing Security Operations.-Chapter 17: Preventing and Responding to Incidents.-Chapter 18: Disaster Recovery Planning.-Chapter 19: Investigations and Ethics.-Chapter 20: Software Development Security.-Chapter 21: Malicious Code and Application Attacks.-Index-
978-1-119-78623-8
regulations protecting Cryptography
005.8 / C467c
Certified information Systems security professional: official study guide - 9a. Edición - New Jersey, SYBEX; 2021 - 1248 páginas tablas; gráficos 23x18 cm
incluye índice de contenido
Chapter 1: Security Governance Through Principles and Policies.-Chapter 2: Personnel Security and Risk Management Concepts.-Chapter 3: Business Continuity Planning.-Chapter 4: Laws, Regulations, and Compliance.-Chapter 5: Protecting Security of Assets.-Chapter 6: Cryptography and Symmetric Key Algorithms.-Chapter 7: PKI and Cryptographic Applications.-Chapter 8: Principles of Security Models, Design, and Capabilities.-Chapter 9: Security Vulnerabilities, Threats, and Countermeasures.-Chapter 10: Physical Security Requirements.-Chapter 11: Secure Network Architecture and Components.-Chapter 12: Secure Communications and Network Attacks.-Chapter 13: Managing Identity and Authentication.-Chapter 14: Controlling and Monitoring Access.-Chapter 15: Security Assessment and Testing.-Chapter 16: Managing Security Operations.-Chapter 17: Preventing and Responding to Incidents.-Chapter 18: Disaster Recovery Planning.-Chapter 19: Investigations and Ethics.-Chapter 20: Software Development Security.-Chapter 21: Malicious Code and Application Attacks.-Index-
978-1-119-78623-8
regulations protecting Cryptography
005.8 / C467c